Cisco (350-401-ENCOR) Exam Questions And Answers page 32
Which of the following can be monitored by the EEM IOSWDSysMon core event publisher? (Select the best answer.)
memory utilization
syslog messages
timed events
counter thresholds
Infrastructure
Network Assurance
What is the difference between the MAC address table and TCAM?
TCAM is used to make L2 forwarding decisions. CAM is used to build routing tables.
Router prefix lookups happen in TCAM. MAC address table lookups happen in CAM.
The MAC address table supports partial matches. TCAM requires an exact match.
The MAC address table is contained in TCAM. ACL and QoS information is stored in CAM.
Infrastructure
Network Assurance
Which three resources must the hypervisor make available to the virtual machines? (Choose three.)
secure access
IP address
Processor
storage
Memory
bandwidth
Virtualization
Infrastructure
Which AP mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?
client mode
SE-connect mode
sensor mode
sniffer mode
Virtualization
Security
What is a key characteristic of YANG?
Single Choice
What is a characteristic of YANG?
It is a Cisco proprietary language that models NETCONF data.
It allows model developers to create custom data types.
It structures data in an object-oriented fashion to promote model reuse.
It provides loops and conditionals to control flow within models.
Architecture
Security
An engineer plans to use Python to convert text files that contain device information to JSON Drag and drop the code snippets from the bottom onto the blanks in the code to construct the request. Not all options are used.
Infrastructure
Security
What are two considerations when using SSO as a network redundancy feature? (Choose two.)
requires synchronization between supervisors in order to guarantee continuous connectivity
the multicast state is preserved during switchover
must be combined with NSF to support uninterrupted Layer 3 operations
both supervisors must be configured separately
must be combined with NSF to support uninterrupted Layer 2 operations
Network Assurance
Security
Refer to the exhibit.
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
R1(config)#router bgp 1
R1(config-router)#neighbor 192.168.10.2 remote-as 2
R1(config-router)#network 10.1.1.0 mask 255.255.255.0
R2(config)#router bgp 2
R2(config-router)#neighbor 192.168.10.1 remote-as 1
R2(config-router)#network 10.2.2.0 mask 255.255.255.0
R1(config-router)#neighbor 192.168.10.2 remote-as 2
R1(config-router)#network 10.1.1.0 mask 255.255.255.0
R2(config)#router bgp 2
R2(config-router)#neighbor 192.168.10.1 remote-as 1
R2(config-router)#network 10.2.2.0 mask 255.255.255.0
R1(config)#router bgp 1
R1(config-router)#neighbor 10.2.2.2 remote-as 2
R1(config-router)#network 10.1.1.0 mask 255.255.255.0
R2(config)#router bgp 2
R2(config-router)#neighbor 10.1.1.1 remote-as 1
R2(config-router)#network 10.2.2.0 mask 255.255.255.0
R1(config-router)#neighbor 10.2.2.2 remote-as 2
R1(config-router)#network 10.1.1.0 mask 255.255.255.0
R2(config)#router bgp 2
R2(config-router)#neighbor 10.1.1.1 remote-as 1
R2(config-router)#network 10.2.2.0 mask 255.255.255.0
R1(config)#router bgp 1
R1(config-router)#neighbor 192.168.10.2 remote-as 2
R1(config-router)#network 10.0.0.0 mask 255.0.0.0
R2(config)#router bgp 2
R2(config-router)#neighbor 192.168.10.1 remote-as 1
R2(config-router)#network 10.0.0.0 mask 255.0.0.0
R1(config-router)#neighbor 192.168.10.2 remote-as 2
R1(config-router)#network 10.0.0.0 mask 255.0.0.0
R2(config)#router bgp 2
R2(config-router)#neighbor 192.168.10.1 remote-as 1
R2(config-router)#network 10.0.0.0 mask 255.0.0.0
R1(config)#router bgp 1
R1(config-router)#neighbor 10.2.2.2 remote-as 2
R1(config-router)#neighbor 10.2.2.2 update-source lo0
R1(config-router)#network 10.1.1.0 mask 255.255.255.0
R2(config)#router bgp 2
R2(config-router)#neighbor 10.1.1.1 remote-as 1
R2(config-router)#neighbor 10.1.1.1 update-source lo0
R2(config-router)#network 10.2.2.0 mask 255.255.255.0
R1(config-router)#neighbor 10.2.2.2 remote-as 2
R1(config-router)#neighbor 10.2.2.2 update-source lo0
R1(config-router)#network 10.1.1.0 mask 255.255.255.0
R2(config)#router bgp 2
R2(config-router)#neighbor 10.1.1.1 remote-as 1
R2(config-router)#neighbor 10.1.1.1 update-source lo0
R2(config-router)#network 10.2.2.0 mask 255.255.255.0
Virtualization
Security
Which CHAP packet has a Code field value of 4?
Single Choice
Which of the following CHAP packets contains a Code field that is set to a value of 4? (Select the best answer.)
Challenge
Failure
Response
Success
Network Assurance
Security
Which nodes are available in a two-node OpenStack architecture? (Select 2 choices.)
the compute node
the controller node
the network node
the server node
Architecture
Infrastructure
Comments