Podcast
Questions and Answers
Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?
Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?
What action completes the configuration to achieve a dynamic continuous mapped NAT for all users?
What action completes the configuration to achieve a dynamic continuous mapped NAT for all users?
Increase the NAT pool size to support 254 usable addresses
An engineer configures HSRP group 37. The configuration modifies the default virtual MAC address.
An engineer configures HSRP group 37. The configuration modifies the default virtual MAC address.
False
SwitchC connects HR and Sales to the Core switch. However, business needs require that no traffic from the Finance VLAN traverse this switch. The command that meets this requirement is to ______.
SwitchC connects HR and Sales to the Core switch. However, business needs require that no traffic from the Finance VLAN traverse this switch. The command that meets this requirement is to ______.
Signup and view all the answers
How are map-register messages sent in a LISP deployment?
How are map-register messages sent in a LISP deployment?
Signup and view all the answers
Match the following commands with their correct effects:
Match the following commands with their correct effects:
Signup and view all the answers
What action resolves the issue of guest users being able to access other guest user devices on the customer guest WLAN?
What action resolves the issue of guest users being able to access other guest user devices on the customer guest WLAN?
Signup and view all the answers
What distinguishes Ansible from Chef?
What distinguishes Ansible from Chef?
Signup and view all the answers
In an SD-Access solution, what is the role of a fabric edge node?
In an SD-Access solution, what is the role of a fabric edge node?
Signup and view all the answers
What is a benefit of a virtual machine when compared with a physical server?
What is a benefit of a virtual machine when compared with a physical server?
Signup and view all the answers
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
Signup and view all the answers
At which Layer does Cisco DNA Center support REST controls?
At which Layer does Cisco DNA Center support REST controls?
Signup and view all the answers
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
Signup and view all the answers
Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?
Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?
Signup and view all the answers
Which AP mode allows an engineer to scan configured channels for rogue access points?
Which AP mode allows an engineer to scan configured channels for rogue access points?
Signup and view all the answers
Cloud deployments have lower upfront costs than on-premises deployments.
Cloud deployments have lower upfront costs than on-premises deployments.
Signup and view all the answers
What action must an engineer perform to implement a route map in BGP to support redistribution and permit all unmatched routes?
What action must an engineer perform to implement a route map in BGP to support redistribution and permit all unmatched routes?
Signup and view all the answers
Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session?
Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session?
Signup and view all the answers
What does the LAP send when multiple WLCs respond to the CISCO_CAPWAPCONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
What does the LAP send when multiple WLCs respond to the CISCO_CAPWAPCONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
Signup and view all the answers
Which GLBP load balancing method supports members of the group with different throughput capabilities?
Which GLBP load balancing method supports members of the group with different throughput capabilities?
Signup and view all the answers
In a Cisco SD-WAN solution, what functions are performed by OMP? (Choose two)
In a Cisco SD-WAN solution, what functions are performed by OMP? (Choose two)
Signup and view all the answers
What is a benefit of Type 1 hypervisors?
What is a benefit of Type 1 hypervisors?
Signup and view all the answers
What is the wireless received signal strength indicator?
What is the wireless received signal strength indicator?
Signup and view all the answers
Which technology is used as the basis for the Cisco SD-Access data plane?
Which technology is used as the basis for the Cisco SD-Access data plane?
Signup and view all the answers
What is YANG used for?
What is YANG used for?
Signup and view all the answers
Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?
Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?
Signup and view all the answers
How many flow exporters are needed per network device in the flexible NetFlow configuration?
How many flow exporters are needed per network device in the flexible NetFlow configuration?
Signup and view all the answers
What are two considerations when using SSO as a network redundancy feature?
What are two considerations when using SSO as a network redundancy feature?
Signup and view all the answers
Which command is required to verify NETCONF capability reply messages?
Which command is required to verify NETCONF capability reply messages?
Signup and view all the answers
Refer to the exhibit. Which type of antenna does the radiation pattern represent?
Refer to the exhibit. Which type of antenna does the radiation pattern represent?
Signup and view all the answers
Which new enhancement was implemented in Wi-Fi 6?
Which new enhancement was implemented in Wi-Fi 6?
Signup and view all the answers
Which Cisco DNA Center application is responsible for group-based access control permissions?
Which Cisco DNA Center application is responsible for group-based access control permissions?
Signup and view all the answers
An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail. Which configuration should be applied?
An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail. Which configuration should be applied?
Signup and view all the answers
Which Python code snippet prints the descriptions of disabled interfaces only?
Which Python code snippet prints the descriptions of disabled interfaces only?
Signup and view all the answers
When firewall capabilities are considered, which feature is found only in Cisco next-generation firewalls?
When firewall capabilities are considered, which feature is found only in Cisco next-generation firewalls?
Signup and view all the answers
What does a northbound API accomplish?
What does a northbound API accomplish?
Signup and view all the answers
How does CEF switching differ from process switching on Cisco devices?
How does CEF switching differ from process switching on Cisco devices?
Signup and view all the answers
When configuring WPA2 Enterprise on a WLAN, which additional security component configuration is required?
When configuring WPA2 Enterprise on a WLAN, which additional security component configuration is required?
Signup and view all the answers
What is the difference between TCAM and the MAC address table?
What is the difference between TCAM and the MAC address table?
Signup and view all the answers
Which exhibit displays a valid JSON file?
Which exhibit displays a valid JSON file?
Signup and view all the answers
A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?
A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?
Signup and view all the answers
How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?
How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?
Signup and view all the answers
A client device roams between wireless LAN controllers that are mobility peers. Both controllers have dynamic interfaces on the same client VLAN. Which type of roam is described?
A client device roams between wireless LAN controllers that are mobility peers. Both controllers have dynamic interfaces on the same client VLAN. Which type of roam is described?
Signup and view all the answers
What is the responsibility of a secondary WLC?
What is the responsibility of a secondary WLC?
Signup and view all the answers
Which two characteristics define the Intent API provided by Cisco DNA Center?
Which two characteristics define the Intent API provided by Cisco DNA Center?
Signup and view all the answers
Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)?
Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)?
Signup and view all the answers
Refer to the exhibit. Which configuration change will force BR2 to reach 209.165.201.0/27 via BR1?
Refer to the exhibit. Which configuration change will force BR2 to reach 209.165.201.0/27 via BR1?
Signup and view all the answers
Which two methods are used to reduce the AP coverage area?
Which two methods are used to reduce the AP coverage area?
Signup and view all the answers
Which configuration achieves the goal of terminating all idle-exec sessions in 600 seconds?
Which configuration achieves the goal of terminating all idle-exec sessions in 600 seconds?
Signup and view all the answers
Which two threats does AMP4E have the ability to block?
Which two threats does AMP4E have the ability to block?
Signup and view all the answers
What does the Cisco REST response indicate?
What does the Cisco REST response indicate?
Signup and view all the answers
An engineer configures NAT on R1. What does the output confirm?
An engineer configures NAT on R1. What does the output confirm?
Signup and view all the answers
An engineer is troubleshooting the AP join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?
An engineer is troubleshooting the AP join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?
Signup and view all the answers
Which change to the first line of the script resolves the error?
Which change to the first line of the script resolves the error?
Signup and view all the answers
An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the active HSRP router.
An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the active HSRP router.
Signup and view all the answers
What is the function of a fabric border node in a Cisco SD-Access environment?
What is the function of a fabric border node in a Cisco SD-Access environment?
Signup and view all the answers
A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. Which configuration allows the peering session to form between R1 and R2?
A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. Which configuration allows the peering session to form between R1 and R2?
Signup and view all the answers
Which two operational models enable an AP to scan one or more wireless channels for rogue access points and at the same time provide wireless services to clients?
Which two operational models enable an AP to scan one or more wireless channels for rogue access points and at the same time provide wireless services to clients?
Signup and view all the answers
What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?
What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?
Signup and view all the answers
What is one benefit of implementing a VSS architecture?
What is one benefit of implementing a VSS architecture?
Signup and view all the answers
What does Call Admission Control require the client to send in order to reserve the bandwidth?
What does Call Admission Control require the client to send in order to reserve the bandwidth?
Signup and view all the answers
Where is radio resource management performed in a Cisco SD-Access wireless solution?
Where is radio resource management performed in a Cisco SD-Access wireless solution?
Signup and view all the answers
How does EIGRP differ from OSPF?
How does EIGRP differ from OSPF?
Signup and view all the answers
Which HTTP JSON response does the Python code output give?
Which HTTP JSON response does the Python code output give?
Signup and view all the answers
The connecting between SW1 and SW2 is not operational. Which two actions resolve the issue?
The connecting between SW1 and SW2 is not operational. Which two actions resolve the issue?
Signup and view all the answers
An engineer is troubleshooting a connectivity issue and executes a traceoute. What does the result confirm?
An engineer is troubleshooting a connectivity issue and executes a traceoute. What does the result confirm?
Signup and view all the answers
Which device makes the decision for a wireless client to roam?
Which device makes the decision for a wireless client to roam?
Signup and view all the answers
How is MSDP used to interconnect multiple PIM-SM domains?
How is MSDP used to interconnect multiple PIM-SM domains?
Signup and view all the answers
A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task?
A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task?
Signup and view all the answers
Which action is the vSmart controller responsible for in an SD-WAN deployment?
Which action is the vSmart controller responsible for in an SD-WAN deployment?
Signup and view all the answers
If the noise floor is -90 dBm and a wireless client is receiving a signal of -75 dBm, what is the SNR?
If the noise floor is -90 dBm and a wireless client is receiving a signal of -75 dBm, what is the SNR?
Signup and view all the answers
An engineer must create a script that appends the output of the show process cpu sorted command to a file. Which action accomplishes this?
An engineer must create a script that appends the output of the show process cpu sorted command to a file. Which action accomplishes this?
Signup and view all the answers
Which two mechanisms are available to secure NTP?
Which two mechanisms are available to secure NTP?
Signup and view all the answers
What is the difference between CEF and process switching?
What is the difference between CEF and process switching?
Signup and view all the answers
Which AP mode allows an engineer to scan configured channels for rogue access points?
Which AP mode allows an engineer to scan configured channels for rogue access points?
Signup and view all the answers
What is a characteristic of MACsec?
What is a characteristic of MACsec?
Signup and view all the answers
An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and the default route 0.0.0.0/0 is still missing. Which configuration must the engineer apply to resolve the problem?
An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and the default route 0.0.0.0/0 is still missing. Which configuration must the engineer apply to resolve the problem?
Signup and view all the answers
A network engineer must configure a router to send logging messages to a syslog server. Which configuration must be used?
A network engineer must configure a router to send logging messages to a syslog server. Which configuration must be used?
Signup and view all the answers
After configuring NETCONF, an engineer gets output from 'show line' but not from 'show running-config'. Which command completes the configuration?
After configuring NETCONF, an engineer gets output from 'show line' but not from 'show running-config'. Which command completes the configuration?
Signup and view all the answers
Which WLAN Layer 3 setting must be configured to provide users with a splash page for authentication?
Which WLAN Layer 3 setting must be configured to provide users with a splash page for authentication?
Signup and view all the answers
Which antenna type should be used for a site-to-site wireless connection?
Which antenna type should be used for a site-to-site wireless connection?
Signup and view all the answers
An engineer is troubleshooting an application running on Apple phones receiving incorrect QoS markings. What change on the WLC optimizes QoS for these devices?
An engineer is troubleshooting an application running on Apple phones receiving incorrect QoS markings. What change on the WLC optimizes QoS for these devices?
Signup and view all the answers
What is the function of the LISP map resolver?
What is the function of the LISP map resolver?
Signup and view all the answers
A network administrator applies the following configuration to an IOS device. What is the process of password checks when a login attempt is made to the device?
A network administrator applies the following configuration to an IOS device. What is the process of password checks when a login attempt is made to the device?
Signup and view all the answers
What is the purpose of the LISP routing and addressing architecture?
What is the purpose of the LISP routing and addressing architecture?
Signup and view all the answers
How does Cisco Trustsec enable more access controls for dynamic networking environments and data centers?
How does Cisco Trustsec enable more access controls for dynamic networking environments and data centers?
Signup and view all the answers
A network engineer configures a GRE tunnel and enters the 'show interface tunnel' command. What does the output confirm about the configuration?
A network engineer configures a GRE tunnel and enters the 'show interface tunnel' command. What does the output confirm about the configuration?
Signup and view all the answers
When 'HTTP/1.1 204 content' is returned after issuing the 'curl -X DELETE' command, what does this signify?
When 'HTTP/1.1 204 content' is returned after issuing the 'curl -X DELETE' command, what does this signify?
Signup and view all the answers
A company plans to implement intent-based networking in its campus infrastructure. Which design facilitates a migration from a traditional campus design to a programmable fabric design?
A company plans to implement intent-based networking in its campus infrastructure. Which design facilitates a migration from a traditional campus design to a programmable fabric design?
Signup and view all the answers
When a wireless client roams between two different wireless controllers, causing network connectivity outage, which configuration issue would likely cause this problem?
When a wireless client roams between two different wireless controllers, causing network connectivity outage, which configuration issue would likely cause this problem?
Signup and view all the answers
The IP SLA is configured in a router. An engineer wants to configure an EEM applet to manage the interface based on the IP SLA operation. Which configuration should the engineer use?
The IP SLA is configured in a router. An engineer wants to configure an EEM applet to manage the interface based on the IP SLA operation. Which configuration should the engineer use?
Signup and view all the answers
Which of the following JSON syntaxes is valid?
Which of the following JSON syntaxes is valid?
Signup and view all the answers
An engineer needs to deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces must be allowed at all times. Which command accomplishes this task?
An engineer needs to deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces must be allowed at all times. Which command accomplishes this task?
Signup and view all the answers
Study Notes
Implementing Cisco Enterprise Network Core Technologies (ENCOR)
- The exam consists of 35 questions and lasts 120 minutes.
- The exam code is 350-401.
Type 1 Hypervisors
- Benefit: allows creation of virtual networks to interconnect virtual machines in Layer 2 topologies.
Wireless Received Signal Strength Indicator (RSSI)
- Measures how well a device can hear a signal from an access point or router.
- Measured in decibels (dBm) from 0 to -120.
- Closer to 0, the stronger the signal is, which is better for wireless connections.
Cisco SD-Access Data Plane
- Uses Virtual Network Identifier (VNI) to identify a specific virtual network.
- Based on VXLAN technology.
YANG (Yet Another Next Generation) Data Model
- Used to describe data models.
Cisco DNA Center
- Allows management of non-Cisco devices through the use of a Software Development Kit (SDK) that creates Device Packages for third-party devices.
- Application responsible for group-based access control permissions is Policy.
Flexible NetFlow
- Two flow exporters are needed per network device in the flexible NetFlow configuration.
SSO (Stateful Switchover) and NSF (Nonstop Forwarding)
- Ensure redundancy and uninterrupted Layer 3 traffic.
- Must be combined with NSF to support uninterrupted Layer 2 and Layer 3 operations.
HSRP (Hot Standby Router Protocol)
- Ensures that traffic is not disrupted in the event of a hardware failure.
- Uses a virtual MAC address.
Control Plane Policing
- Implemented for SSH and Telnet using specific configuration sets.
QoS (Quality of Service)
- Classification, marking, and policing of traffic are components of QoS.
EEM (Embedded Event Manager)
- Enables OSPF debugging in the event of an OSPF neighborship going down.
Syslog
- Used to send logging messages to a syslog server.
- Requires a specific configuration using a reliable protocol and a specific IP address.
NETCONF
- Used to configure a router.
- Requires a specific configuration to complete the configuration.
Wireless Network Configuration
- A specific configuration is required to provide a splash page for authentication.
EtherChannel
- A channel-misconfig error can be resolved by configuring the same protocol on the EtherChannel on both switches.
LISP (Locator/ID Separation Protocol)
- Map resolver (MR) receives MAP requests, de-encapsulates them, and forwards them to the Mapping Server (MS).
- Used to separate location and identity of network nodes.
Cisco Trustsec
- Enables more access controls for dynamic networking environments and data centers.
- Classifies traffic based on the contextual identity of the endpoint rather than its IP address.
GRE Tunnel
- The output of the
show interface tunnel
command confirms the configuration of the GRE tunnel.
HTTP/1.1 204 Content
- Returned when the
curl -I -X delete
command is issued, indicating that the object was successfully deleted.
Intent-Based Networking
- A company can migrate from a traditional campus design to a programmer fabric designer using Cisco DNA Center.### Wireless Networking
- When a wireless client roams between two different wireless controllers, a network connectivity outage is experienced for a period of time. This is caused by a configuration issue where not all controllers in the mobility group are using the same virtual interface IP address.
IP SLA and EEM Applet
- IP SLA can be configured to ping an IP address every 3 seconds to ensure the connection is still up.
- An EEM applet can be configured to shut down an interface and bring it back up when there is a problem with the IP SLA.
JSON Syntax
- A valid JSON syntax example: {'switch': {'name': 'dist1', 'interfaces': ['gig1', 'gig2', 'gig3']}}
Access Control
- To deny Telnet traffic from the loopback interface of one router to the loopback interface of another router, a time-range and access-list can be configured.
TCAM and CAM
- TCAM (Ternary Content Addressable Memory) is used for faster address lookups, enabling fast routing in routers.
- CAM (Content Addressable Memory) is used for building and looking up the MAC address table, enabling L2 forwarding decisions in switches.
Virtualization
- A Type 2 hypervisor runs on top of an operating system and not on the physical hardware directly.
- Examples of Type 2 hypervisors include VMware Workstation and Microsoft Virtual PC.
Cisco Trustsec
- Cisco Trustsec enables more flexible access controls for dynamic networking environments and data centers by classifying traffic based on the contextual identity of the endpoint rather than its IP address.
Mobility
- When a client device roams between wireless LAN controllers that are mobility peers, both controllers have a dynamic interface on the same client VLAN, which is an example of inter-controller roam.
Secondary WLC
- The responsibility of a secondary WLC is to register the LAPs if the primary controller fails.
Intent API
- The Intent API is a Northbound REST API that exposes specific capabilities of the Cisco DNA Center platform.
- It provides policy-based abstraction of business intent, allowing focus on an outcome rather than struggling with individual mechanisms steps.
DHCP Option
- DHCP option 43 provides the CAPWAP APs with the address of the wireless controller(s).
- DHCP option 150 provides the CAPWAP APs with the address of the wireless controller(s).
MED Attribute
- The MED (Multi-Exit Discriminator) attribute is used to influence the route selection process in BGP.
- It is a non-transitive attribute that is sent through ASes to external BGP neighbors.
- A lower MED value is preferred.
AP Coverage Area
- To reduce the AP coverage area, the AP transmit power can be reduced or the minimum mandatory data rate can be increased.
Security Policy
- To terminate all idle-exec sessions in 600 seconds, the absolute-timeout command can be used in the line vty configuration.
AMP4E
- AMP4E (Advanced Malware Protection for Endpoints) has the ability to block ransomware and Microsoft Word macro attacks.
Cisco DNA Center
- The Intent API is a Northbound REST API that exposes specific capabilities of the Cisco DNA Center platform.
- Cisco DNA Center is a solution that provides a single, unified way to manage network devices.
SPAN and RSPAN
- SPAN (Switched Port Analyzer) is a feature that allows monitoring of traffic on a specific VLAN or port.
- RSPAN (Remote SPAN) is a feature that allows monitoring of traffic on a remote VLAN or port.
NAT and PAT
- NAT (Network Address Translation) is a technique that allows multiple devices to share a single public IP address.
- PAT (Port Address Translation) is a technique that allows multiple devices to share a single public IP address and port.
DNS and DHCP
- DNS (Domain Name System) is a system that translates hostnames to IP addresses.
- DHCP (Dynamic Host Configuration Protocol) is a protocol that assigns IP addresses to devices on a network.
Access Point Join Process
- The AP join process can be configured using DNS.
- The AP can obtain the IP address of the WLC using DNS.
Ansible and Chef
- Ansible and Chef are both automation tools used for configuration management.
- Ansible uses YAML to manage configurations and pushes the configuration to the client.
- Chef uses Ruby to manage configurations and the client pulls the configuration from the server.
SD-Access Solution
- In an SD-Access solution, the fabric edge node connects wired endpoints to the SD-Access fabric.
Virtual Machine
- A virtual machine can run multiple virtual servers on the same physical server without having to buy additional hardware.
TLS for Syslog
- TLS (Transport Layer Security) can be used to securely transport syslog messages.
- The default port for syslog over TLS is 6514.
Cisco DNA Center
- Cisco DNA Center supports REST controls at the Northbound API layer.
- YAML output from responses to API calls can be used to configure devices.Here are the study notes:
TTL Exceeded Message
- When the TTL (Time To Live) of a packet expires, the router discards the packet and sends an ICMP Time Exceeded message.
- Routers check the TTL first before processing a packet further.
- If the TTL is zero, the router discards the packet and sends an ICMP Time Exceeded message.
MACsec Technology
- MACsec (IEEE 802.1AE) provides MAC-layer encryption over wired networks.
- It uses out-of-band methods for encryption keying.
- The MACsec Key Agreement (MKA) Protocol provides the required session keys and manages the required encryption keys.
VXLAN Environment
- In a VXLAN environment, the VNID (VXLAN Network Identifier) is used to identify Layer 2 segments.
- The VNID is a 24-bit field that is used to maintain Layer 2 isolation between segments.
OSPF Neighborship
- For an OSPF neighborship to form, the correct network command must be applied to the router.
- The network command specifies the network address and area ID.
RESTCONF Operations
- RESTCONF is a protocol for managing network devices.
- Valid RESTCONF operations include OPTIONS, HEAD, GET, POST, PATCH, and DELETE.
Fabric Border Node
- In a Cisco SD-Access environment, a fabric border node connects the SD-Access fabric to another fabric or external Layer 3 networks.
- It is responsible for routed access and provides connectivity to external networks.
EIGRP vs OSPF
- EIGRP and OSPF are both routing protocols, but they have different characteristics.
- EIGRP supports equal or unequal path cost, while OSPF only supports equal path cost.
SD-WAN Deployment
- In an SD-WAN deployment, the vSmart controller is responsible for distributing policies that govern data forwarding.
- The vSmart controller is a critical component of the SD-WAN architecture.
NTP Security
- Two mechanisms are available to secure NTP: IP access list-based and encrypted authentication.
- NTP security is critical to prevent NTP attacks.
CEF and Process Switching
- CEF (Cisco Express Forwarding) and process switching are two different packet forwarding mechanisms.
- CEF uses the FIB (Forwarding Information Base) and adjacency table to make forwarding decisions, whereas process switching punts each packet to the CPU for processing.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of Cisco Enterprise Network Core Technologies (ENCOR) with this quiz. Covers network fundamentals, including Type 1 Hypervisors and Wireless Received Signal Strength Indicator (RSSI).