ENCOR TestV2 Flashcards

1
Q

Refer to the exhibit.

See OneNote!

What is the result when a switch that is running PVST+ is added to this network?

A. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+
B. Both switches operate in the PVST+ mode
C. Spanning tree is disabled automatically on the network
D. Both switches operate in the Rapid PVST+ mode.

A

A. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Refer to the exhibit. What is the JSON syntax that is formed from the data?

MAke is Gocar
Model is Zoom

Features are:

  • Power Windows
  • Manual Drive
  • Auto AC

A. Make”:’Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}
B. ‘Make “: “Gocar1, “Model”: “Zoom”, “Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]
C. {“Make”: Gocar, “Model”: Zoom, “Features”: Power Windows, Manual Drive, Auto AC}
D. (“Make”:[ “Gocar”, “Model”: “Zoom”], Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]}

A

A. Make”:’Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which level message does the WLC send to the syslog server?

A. syslog level errors and less severity messages
B. syslog level errors messages
C. all syslog levels messages
D. syslog level errors and greater severity messages

A

D. syslog level errors and greater severity messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What is the differences between TCAM and the MAC address table?

A. The MAC address table is contained in CAM ACL and QoS information is stored in TCAM
B. The MAC address table supports partial matches. TCAM requires an exact match
C. Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.
D. TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables

A

A. The MAC address table is contained in CAM ACL and QoS information is stored in TCAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which two southbound interfaces originate from Cisco DMA Center and terminate at fabric underlay switches? (Choose two)
A. ICMP: Discovery
B. UDP 67: DHCP
C. TCP 23: Telnet
D. UDP 6007: NetFlow
E. UDP 162: SNMP
A

A. ICMP: Discovery

D. UDP 6007: NetFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is the function of a control-plane node in a Cisco SD-Access solution?

A. to run a mapping system that manages endpoint to network device relationships
B. to implement policies and communicate with networks outside the fabric
C. to connect external Layer 3 networks to the SD Access fabric.
D. to connect APs and wireless endpoints to the SD-Access fabric

A

A. to run a mapping system that manages endpoint to network device relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?

A. RPVST+
B. NSF
C. BFD
D. RP failover

A

B. NSF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two )

A. All devices reload after detecting loss of connection to Cisco DNA Center
B. Already connected users are unaffected, but new users cannot connect
C. User connectivity is unaffected.
D. Cisco DNA Center is unable to collect monitoring data in Assurance.
E. Users lose connectivity

A

C. User connectivity is unaffected.

D. Cisco DNA Center is unable to collect monitoring data in Assurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which measure is used by an NTP server to indicate its closeness to the authoritative time source?

A. time zone
B. hop count
C. stratum
D. latency

A

C. stratum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is a characteristic of a next-generation firewall?

A. only required at the network perimeter
B. required in each layer of the network
C. filters traffic using Layer 3 and Layer 4 information only
D. provides intrusion prevention

A

D. provides intrusion prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Which two components are supported by LISP? (choose two )
A. proxy ETR
B. egress tunnel router
C. route reflector
D. HMAC algorithm
E. spoke
A

A. proxy ETR

B. egress tunnel router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A customer has recently implemented a new wireless infrastructure using WLC-5520S at a site directly next to a large commercial airport Users report that they intermittently lose Wi-Fi connectivity, and troubleshooting reveals it is due to frequent channel changes Which two actions fix this issue? (Choose two)

A. Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list
B. Restore the OCA default settings because this automatically avoids channel interference
C. Disable DFS channels to prevent interference writ) Doppler radar
D. Enable DFS channels because they are immune to radar interference
E. Configure channels on the UNII-2 and the Extended UNII-2 sub-bands of the 5 Ghz band only

A

A. Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list

C. Disable DFS channels to prevent interference writ) Doppler radar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is a characteristic of para-virtualization?

A. Para-virtualization guest servers are unaware of one another
B. Para-virtualization allows direct access between the guest OS and the hypervisor
C. Para-virtualization allows the host hardware to be directly accessed
D. Para-virtualization lacks support for containers

A

C. Para-virtualization allows the host hardware to be directly accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?

A. VLAN
B. VTEP
C. VXLAN
D. VRF

A

C. VXLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. A customer requests a network design that supports these requirements:
    * FHRP redundancy
    * multivendor router environment
    * IPv4 and IPv6 hosts
    Which protocol does the design include?

A. GLBP
B. VRRP version 2
C. VRRP version 3
D. HSRP version 2

A

C. VRRP version 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which unit measures the power of a radio signal with reference to 1 milliwatt?

A. dBw
B. dBm
C. mW
D. dBi

A

C. mW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. What is a characteristic of MACsec?

A. 802.1AE provides encryption and authentication services
B. 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session
C. 802.1AE is bult between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)
D. 802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol

A

B. 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802 1X session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Refer to the exhibit. What happens to access interfaces where VLAN 222 is assigned?
    !
    vlan 222
    remote-span
    !
    vlan 223
    remote-span
    !
    monitor session 1 source interface FastEthernet0/1 tx
    monitor session 1 source interface FastEthernet0/2 rx
    monitor session 1 source interface port-channel 5
    monitor session 1 destination remote vlan 222
    !

A. STP BPDU guard is enabled
B. A description “RSPAN” is added
C. They are placed into an inactive state
D. They cannot provide PoE

A

C. They are placed into an inactive state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Drag and drop the virtual component from the left onto their descriptions on the right.
  • is a zip file connecting a virtual machine configuration file and a virtual disk.
  • is a file containing a virtual machine disk drive.
  • is a configuration file containing settings for a virtual machine such as a guest OS.
  • is a component of a virtual machine responsible for sending packets to the hypervisor.

C. vNIC
A. OVA
D. VMX
B. VMDK

A

A. OVA is a zip file connecting a virtual machine configuration file and a virtual disk.
B. VMDK is a file containing a virtual machine disk drive.
C. vNIC is a configuration file containing settings for a virtual machine such as a guest OS.
D. VMX is a component of a virtual machine responsible for sending packets to the hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Drag and drop the characteristics from the left onto the QoS components they describe on the right.

= applied on traffic to convey Information to a downstream device
= distinguish traffic types
= Permits traffic to pass through the device while retaining DSCP/COS values
= process used to buffer traffic that exceeds a predefined rate.

C. Trust
A. Marking
D. Shaping
B. Classification

A

A. Marking = applied on traffic to convey Information to a downstream device
B. Classification = distinguish traffic types
C. Trust = Permits traffic to pass through the device while retaining DSCP/COS values
D. Shaping = process used to buffer traffic that exceeds a predefined rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

New question about vEdge dashboard not associated with vSmart.

A

Answer: A misconfig on the port number once the IP was correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

New Question About Switch Stack

A

Answer:
9 SW - 3850
8 SW - 2960X
4 SW - 2960S/SF

23
Q
  1. Refer to the exhibit. A network engineer configures OSPF and reviews the router configuration Which interface or interfaces are able to establish OSPF adjacency?

A. GigabitEthemet0/1 and GigabitEthernet0/1.40
B. only GigabitEthernet0/1
C. only GigabttEthernet0/0
D. Gigabit Ethernet0/0 and GigabitEthemet0/1

A

A. GigabitEthemet0/1 and GigabitEthernet0/1.40

24
Q
  1. What ate two characteristics of Cisco SD-Access elements? (Choose two )

A. The border node is required for communication between fabric and nonfabric devices.
B. Fabric endpoints are connected directly to the border node
C. Traffic within the fabric always goes through the control plane node
D. The control plane node has the full RLOC-to-EID mapping database
E. The border node has the full RLOC-to-EID mapping database

A

A. The border node is required for communication between fabric and nonfabric devices.
D. The control plane node has the full RLOC-to-EID mapping database

25
Q
  1. What is the data policy in a Cisco SD-WAN deployment?

A. list of ordered statements that define node configurations and authentication used within the SDWAN overlay
B. Set of statements that defines how data is forwarded based on IP packet information and specific VPNs
C. detailed database mapping several kinds of addresses with their corresponding location
D. group of services tested to guarantee devices and links liveliness within the SD-WAN overlay

A

B. Set of statements that defines how data is forwarded based on IP packet information and specific VPNs

26
Q
  1. Refer to the exhibit. What step resolves the authentication issue?

See OneNote

A. use basic authentication
B. change the port to 12446
C. target 192 168 100 82 in the URI
D. restart the vsmart host

A

D. restart the vsmart host

27
Q
  1. Refer to the exhibit. An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEthemet1 interface. Which two commands must be added to the existing configuration to accomplish this task? (Choose two)
!
interface GigabitEthernet1
vrf forwarding STAFF
no IP address 
negotiation auto
no mop enabled
no mop sysid
end
!

A. Router(config-vrf)#address-family ipv6
B. Router(config-if)#ip address 192.168.1.1 255.255.255.0
C. Router(config-vrf)#ip address 192.168.1.1 255.255.255.0
D. Router(config-if)=address-family ipv4
E. Router(config-vrf)#address-family ipv4

A

B. Router(config-if)#ip address 192.168.1.1 255.255.255.0

E. Router(config-vrf)#address-family ipv4

28
Q
  1. Refer to the exhibit. A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).

See OneNote

A. Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4.
B. Create an IPsec profile, associate the transform-set. and apply the profile to the tunnel interface.
C. Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24.
D. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL |>]
E. Create an IPsec profile, associate the transform-set ACL. and apply the profile to the tunnel interface

A

A. Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4.

E. Create an IPsec profile, associate the transform-set ACL. and apply the profile to the tunnel interface

29
Q
  1. Refer to the exhibit. Communication between London and New York is down Which command set must be applied to resolve this issue?

See OneNote

A.
NewYork(config)#int f0/1
NewYork(config)#switchport trunk encap dot1q
NewYork(config)#end

B.
NewYork(config)#int f0/1
NewYork(config)#switchport mode trunk
NewYork(config)#end

C.
NewYork(config)#int f0/1
NewYork(config)#switchport nonegotiate
NewYork(config)#end

D.
NewYork(config)#int f0/1
NewYork(config)#switchport mode dynamic desirable
NewYork(config)#end

A

B.
NewYork(config)#int f0/1
NewYork(config)#switchport mode trunk
NewYork(config)#end

30
Q
  1. Which encryption hashing algorithm does NTP use for authentication?

A. SSL
B. MD5
C. AES128
D. AES256

A

B. MD5

31
Q
  1. What is a VPN in a Cisco SD-WAN deployment?

A. common exchange point between two different services
B. attribute to identify a set of services offered in specific places in the SD-WAN fabric
C. virtualized environment that provides traffic isolation and segmentation in the SD-WAN fabric
D. virtual channel used to carry control plane information

A

C. virtualized environment that provides traffic isolation and segmentation in the SD-WAN fabric

32
Q
  1. What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?

A. host
B. mainframe
C. container
D. virtual machine

A

D. virtual machine

33
Q
  1. Which two methods are used to reduce the AP coverage area? (Choose two.)
A. Increase minimum mandatory data rate
B. Reduce AP transmit power
C. Disable 2.4 GHz and use only 5 GHz.
D. Enable Fastlane.
E. Reduce channel width from 40 MHz to 20 MHz
A

B. Reduce AP transmit power

E. Reduce channel width from 40 MHz to 20 MHz

34
Q
  1. In a Cisco SD-Access solution, what is the role of the Identity Services Engine?

A. It is leveraged for dynamic endpoint to group mapping and policy definition.
B. It provides GUI management and abstraction via apps that share context.
C. it is used to analyze endpoint to app flows and monitor fabric status.
D. It manages the LISP EID database.

A

C. it is used to analyze endpoint to app flows and monitor fabric status.

35
Q
  1. In a Cisco SD-Access solution, what is the role of the Identity Services Engine?

A. It is leveraged for a dynamic endpoint to group mapping and policy definition.
B. It provides GUI management and abstraction via apps that share context.
C. it is used to analyze endpoint to app flows and monitor fabric status.
D. It manages the LISP EID database.

A

C. it is used to analyze endpoint to app flows and monitor fabric status.

36
Q

324.

See OneNote

A. DSW2(config-if)#spanning-tree port-priority 128
B. DSW2(config-if)#spanning-tree port-priority 16
C. DSW2(config-if)#interface gi1/3
D. DSW1(config-if)#interface gi1/3
E. DWS1(config-if)#spanning-tree port-priority 0

A

D. DSW1(config-if)#interface gi1/3

E. DWS1(config-if)#spanning-tree port-priority 0

37
Q
  1. In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?

A. provide QoS prioritization services such as marking, queueing, and classification for critical
network traffic
B. provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence
C. provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port security
D. provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRP

A

A. provide QoS prioritization services such as marking, queueing, and classification for critical
network traffic

38
Q
  1. Which two network problems indicate a need to implement QoS in a campus network? (Choose two)
A. port flapping
B. excess jitter
C. misrouted network packets
D. duplicate IP addresses
E. bandwidth-related packet loss
A

B. excess jitter

D. duplicate IP addresses

39
Q
  1. A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two.)

A. 802.1X
B. WPA (AES)
C. WPA2 (AES) jWEP
D. OPEN

A

A. 802.1X

C. WPA2 (AES) jWEP

40
Q
  1. Which data is properly formatted with JSON?
A.
{
"name":"Peter"
"age":"25"
"likesJson":true
"characteristics":["small","strong",18]
}
B.
{
"name": Peter,
"age": 25,
"likesJson": true,
"characteristics":["small", "strong", "18"],
}
C.
{
"name": "Peter",
"age": "25",
"likesJson": true,
"characteristics":["small","strong",18]
}
D.
{
"name": "Peter",
"age": "25",
"likesJson": true,
"characteristics": ["small","strong",18],
}
A
C.
{
"name": "Peter",
"age": "25",
"likesJson": true,
"characteristics":["small","strong",18]
}
41
Q
  1. Which outcome is achieved with this Python code?
client connect (IP, port= 22, username= usr, (password= pswd)
stdin, stdout, stderr = clien.exec_command ('show IP bgp 192.168.101.0 bestpath\n')
print(stdout )

A. connects to a Cisco device using SSH and exports the routing table information
B. displays the output of the show command in a formatted way
C. connects to a Cisco device using SSH and exports the BGP table for the prefix
D. connects to a Cisco device using Telnet and exports the routing table information

A

C. connects to a Cisco device using SSH and exports the BGP table for the prefix

42
Q
  1. Refer to the exhibit. Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1?

See One Note

A. 
interface ethernet0/0
IP address 172.16.0.7 255.255.0.0
!
router ospf 44 vrf hotel
network 172.16.0.0 255.255.0.0
B. 
interface ethernet0/0
vrf forwarding hotel
IP address 172.16.0.7 255.255.0.0
!
router ospf 44 vrf hotel
network 172.16.0.0 255.255.0.0 area 0
C. 
interface ethernet0/0
vrf forwarding bank
IP address 172.16.0.7 255.255.0.0
!
router ospf 44 vrf bank
network 172.16.0.0 255.255.0.0 area 0
D. 
interface ethernet0/0
IP address 172.16.0.7 255.255.0.0
!
router ospf 44 vrf bank
network 172.16.0.0 255.255.0.0
A
A. 
interface ethernet0/0
IP address 172.16.0.7 255.255.0.0
!
router ospf 44 vrf hotel
network 172.16.0.0 255.255.0.0
43
Q
  1. Based on the output below, which Python code shows the value of the “upTime” key?
{
"response": [{
"family": "Routers",
"type": Cisco ASR 1001-X Router",
"errorCode": null,
"location": null,
"macAddress": "00:c8:8b:80:bb:00"
"hostname": "asr1001-x.abcc.inc",
"role": "BORDER ROUTER",
"uptime": "49 days, 13:43:44:13"
}]
}

A.
json_data = response.json()
print(json_data[‘response’][‘family’][‘uptime’])

B.
json_data = response.json()
print(json_data[response][0][uptime])

C.
json_data = json.loads(response.text)
print(json_data[‘response’][‘family’][‘uptime’])

D.
json_data = response.json()
print(json_data[‘response’][0][‘uptime’])

A

C.
json_data = json.loads(response.text)
print(json_data[‘response’][‘family’][‘uptime’])

44
Q
  1. What is YANG used for?

A. scraping data via CLI
B. processing SNMP read-only polls
C. describing data models
D. providing a transport for network configuration data between client and server

A

C. describing data models

45
Q
  1. Refer to the exhibit. Which JSON syntax is derived from this data?
Person#1:
First Name is Johnny
Last Name is Table
Hobbies are:
-Running 
Video Games
Person#2
First Name is Billy
Last Name is Smith
Hobbies are:
-Napping
-Reading

A.
{[{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video Games’]}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’, ‘Reading’]}]}

B.
{‘Person’: [{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: ‘Running’, ‘Video Games’}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: ‘Napping’, ‘Reading’}]}

C.
{[{‘First Name’: ‘Johnny’, ‘ Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video Games’}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’, ‘Reading’}]}

D.
{‘Person’: [{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video Games’]}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’, ‘Reading’}]}

A

C.
{[{‘First Name’: ‘Johnny’, ‘ Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video Games’}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’, ‘Reading’}]}

46
Q
  1. Refer to the exhibit. Which two facts does the device output confirm? (Choose two)

See OneNote

A. The device is using the default HSRP hello timer
B. The standby device is configured with the default HSRP priority
C. The device’s HSRP group uses the virtual IP address 10.0.3.242.
D. The device is configured with the default HSRP priority
E. The device sends unicast messages to its peers

A

A. The device is using the default HSRP hello timer

D. The device is configured with the default HSRP priority

47
Q
  1. The following system log message is presented after a network administrator configures a GRE tunnel %TUN-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing. Why is Tunnel 0 disabled?

A. Because dynamic routing is not enabled
B. Because the tunnel cannot reach its tunnel destination
C. Because the best path to the tunnel destination is through the tunnel itself
D. Because the router cannot recursively identify its egress forwarding interface.

A

C. Because the best path to the tunnel destination is through the tunnel itself

48
Q
  1. Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two.)

A. Utilize DHCP option 17.
B. Configure WLC IP address on LAN switch.
C. Utilize DHCP option 43.
D. Configure an ip helper-address on the router interface
E. Enable port security on the switch port

A

C. Utilize DHCP option 43.

D. Configure an ip helper-address on the router interface

49
Q
  1. Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.

=detects suspicious web activity
=analyzes network behavior and detects anomalies
=uses pxGfid to remediate security threats

A.Stealthwatch
B.Identity Service Engine
C.Web Security Appliance

A

A.Stealthwatch=analyzes network behavior and detects anomalies

B.Identity Service Engine=uses pxGfid to remediate security threats

C.Web Security Appliance=detects suspicious web activity

50
Q
  1. Drag and drop the descriptions from the left onto the routing protocol they describe on the right.
  • advanced distance vector
  • supports only equal-cost path load balancing
  • link-state
  • supports unequal-cost path load balancing
EIGRP
-
-
OSPF
-
-
A

EIGRP

  • advanced distance vector
  • supports unequal-cost path load balancing

OSPF

  • link-state
  • supports only equal-cost path load balancing
51
Q
  1. Drag and drop the characteristic from the left onto the orchestration tools that they describe on the right.
  • uses a pull model
  • declarative
  • uses playbook
  • procedural
Ansible
-
-
Puppet
-
-
A
Ansible
-uses playbook
-procedural
Puppet
-uses a pull model
-declarative
52
Q
  1. Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
  • selects routes using the DUAL algorithm
  • maintains alternative loop-free backup path if available
  • quickly computes new path upon link failure
OSPF
-
-
EIGRP
-
-
A

OSPF

  • maintains alternative loop-free backup path if available
  • quickly computes new path upon link failure

EIGRP
-selects routes using the DUAL algorithm
-

53
Q
  1. Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used.
  • supports devices that are geographically separated
  • supported on Cisco 3750 and 3850 devices
  • supported on the Cisco 4500 and 6500 devices
  • combines exactly two devices
  • supports up to nine device
  • uses proprietary cabling

-
-

A

VSS

  • combines exactly two devices
  • supported on the Cisco 4500 and 6500 devices
  • supports devices that are geographically separated
54
Q
  1. An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used.

R1#sh run | aaa
aaa new-model
aaa authentication login default group ACE group AAA_RADIUS local-case
aaa session-id common

  • AAA servers of AAA_RADIUS group
  • local configured username in non-case-sensative format
  • local configured username in case-sensative format
  • AAA servers of ACE group
  • tacacs servers of group ACE
  • if no method works, then deny login
A
  • local configured username in case-sensative format
  • AAA servers of ACE group
  • AAA servers of AAA_RADIUS group
  • tacacs servers of group ACE