ENCOR TestV2 Flashcards
Refer to the exhibit.
See OneNote!
What is the result when a switch that is running PVST+ is added to this network?
A. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+
B. Both switches operate in the PVST+ mode
C. Spanning tree is disabled automatically on the network
D. Both switches operate in the Rapid PVST+ mode.
A. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+
- Refer to the exhibit. What is the JSON syntax that is formed from the data?
MAke is Gocar
Model is Zoom
Features are:
- Power Windows
- Manual Drive
- Auto AC
A. Make”:’Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}
B. ‘Make “: “Gocar1, “Model”: “Zoom”, “Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]
C. {“Make”: Gocar, “Model”: Zoom, “Features”: Power Windows, Manual Drive, Auto AC}
D. (“Make”:[ “Gocar”, “Model”: “Zoom”], Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]}
A. Make”:’Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}
- Which level message does the WLC send to the syslog server?
A. syslog level errors and less severity messages
B. syslog level errors messages
C. all syslog levels messages
D. syslog level errors and greater severity messages
D. syslog level errors and greater severity messages
- What is the differences between TCAM and the MAC address table?
A. The MAC address table is contained in CAM ACL and QoS information is stored in TCAM
B. The MAC address table supports partial matches. TCAM requires an exact match
C. Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.
D. TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables
A. The MAC address table is contained in CAM ACL and QoS information is stored in TCAM
- Which two southbound interfaces originate from Cisco DMA Center and terminate at fabric underlay switches? (Choose two)
A. ICMP: Discovery B. UDP 67: DHCP C. TCP 23: Telnet D. UDP 6007: NetFlow E. UDP 162: SNMP
A. ICMP: Discovery
D. UDP 6007: NetFlow
- What is the function of a control-plane node in a Cisco SD-Access solution?
A. to run a mapping system that manages endpoint to network device relationships
B. to implement policies and communicate with networks outside the fabric
C. to connect external Layer 3 networks to the SD Access fabric.
D. to connect APs and wireless endpoints to the SD-Access fabric
A. to run a mapping system that manages endpoint to network device relationships
- After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?
A. RPVST+
B. NSF
C. BFD
D. RP failover
B. NSF
- Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two )
A. All devices reload after detecting loss of connection to Cisco DNA Center
B. Already connected users are unaffected, but new users cannot connect
C. User connectivity is unaffected.
D. Cisco DNA Center is unable to collect monitoring data in Assurance.
E. Users lose connectivity
C. User connectivity is unaffected.
D. Cisco DNA Center is unable to collect monitoring data in Assurance.
- Which measure is used by an NTP server to indicate its closeness to the authoritative time source?
A. time zone
B. hop count
C. stratum
D. latency
C. stratum
- What is a characteristic of a next-generation firewall?
A. only required at the network perimeter
B. required in each layer of the network
C. filters traffic using Layer 3 and Layer 4 information only
D. provides intrusion prevention
D. provides intrusion prevention
- Which two components are supported by LISP? (choose two )
A. proxy ETR B. egress tunnel router C. route reflector D. HMAC algorithm E. spoke
A. proxy ETR
B. egress tunnel router
- A customer has recently implemented a new wireless infrastructure using WLC-5520S at a site directly next to a large commercial airport Users report that they intermittently lose Wi-Fi connectivity, and troubleshooting reveals it is due to frequent channel changes Which two actions fix this issue? (Choose two)
A. Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list
B. Restore the OCA default settings because this automatically avoids channel interference
C. Disable DFS channels to prevent interference writ) Doppler radar
D. Enable DFS channels because they are immune to radar interference
E. Configure channels on the UNII-2 and the Extended UNII-2 sub-bands of the 5 Ghz band only
A. Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list
C. Disable DFS channels to prevent interference writ) Doppler radar
- What is a characteristic of para-virtualization?
A. Para-virtualization guest servers are unaware of one another
B. Para-virtualization allows direct access between the guest OS and the hypervisor
C. Para-virtualization allows the host hardware to be directly accessed
D. Para-virtualization lacks support for containers
C. Para-virtualization allows the host hardware to be directly accessed
- Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?
A. VLAN
B. VTEP
C. VXLAN
D. VRF
C. VXLAN
- A customer requests a network design that supports these requirements:
* FHRP redundancy
* multivendor router environment
* IPv4 and IPv6 hosts
Which protocol does the design include?
A. GLBP
B. VRRP version 2
C. VRRP version 3
D. HSRP version 2
C. VRRP version 3
- Which unit measures the power of a radio signal with reference to 1 milliwatt?
A. dBw
B. dBm
C. mW
D. dBi
C. mW
- What is a characteristic of MACsec?
A. 802.1AE provides encryption and authentication services
B. 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session
C. 802.1AE is bult between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)
D. 802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol
B. 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802 1X session
- Refer to the exhibit. What happens to access interfaces where VLAN 222 is assigned?
!
vlan 222
remote-span
!
vlan 223
remote-span
!
monitor session 1 source interface FastEthernet0/1 tx
monitor session 1 source interface FastEthernet0/2 rx
monitor session 1 source interface port-channel 5
monitor session 1 destination remote vlan 222
!
A. STP BPDU guard is enabled
B. A description “RSPAN” is added
C. They are placed into an inactive state
D. They cannot provide PoE
C. They are placed into an inactive state
- Drag and drop the virtual component from the left onto their descriptions on the right.
- is a zip file connecting a virtual machine configuration file and a virtual disk.
- is a file containing a virtual machine disk drive.
- is a configuration file containing settings for a virtual machine such as a guest OS.
- is a component of a virtual machine responsible for sending packets to the hypervisor.
C. vNIC
A. OVA
D. VMX
B. VMDK
A. OVA is a zip file connecting a virtual machine configuration file and a virtual disk.
B. VMDK is a file containing a virtual machine disk drive.
C. vNIC is a configuration file containing settings for a virtual machine such as a guest OS.
D. VMX is a component of a virtual machine responsible for sending packets to the hypervisor.
- Drag and drop the characteristics from the left onto the QoS components they describe on the right.
= applied on traffic to convey Information to a downstream device
= distinguish traffic types
= Permits traffic to pass through the device while retaining DSCP/COS values
= process used to buffer traffic that exceeds a predefined rate.
C. Trust
A. Marking
D. Shaping
B. Classification
A. Marking = applied on traffic to convey Information to a downstream device
B. Classification = distinguish traffic types
C. Trust = Permits traffic to pass through the device while retaining DSCP/COS values
D. Shaping = process used to buffer traffic that exceeds a predefined rate.
New question about vEdge dashboard not associated with vSmart.
Answer: A misconfig on the port number once the IP was correct.