Cisco CCNP ENCOR Practice Exam Back to exams page. Take our Cisco CCNP ENCOR course here. Read our CCNP Enterprise labs book on Amazon. 1. Fabric-based network is composed of both overlay and underlay topologiesTrueFalseQuestion 1 of 50 2. Match the technologies with respective examplesAutomation High availability, WLAN, Redundancy, SD-WANUnselectRouting, Switching, EIGRP, BGPUnselectPython, Ansible, REST APIsUnselectHypervisors and overlay technologiesUnselectACLs, AAA, WebAuthUnselectVirtualization High availability, WLAN, Redundancy, SD-WANUnselectRouting, Switching, EIGRP, BGPUnselectPython, Ansible, REST APIsUnselectHypervisors and overlay technologiesUnselectACLs, AAA, WebAuthUnselectSecurity High availability, WLAN, Redundancy, SD-WANUnselectRouting, Switching, EIGRP, BGPUnselectPython, Ansible, REST APIsUnselectHypervisors and overlay technologiesUnselectACLs, AAA, WebAuthUnselectInfrastructure High availability, WLAN, Redundancy, SD-WANUnselectRouting, Switching, EIGRP, BGPUnselectPython, Ansible, REST APIsUnselectHypervisors and overlay technologiesUnselectACLs, AAA, WebAuthUnselectArchitecture High availability, WLAN, Redundancy, SD-WANUnselectRouting, Switching, EIGRP, BGPUnselectPython, Ansible, REST APIsUnselectHypervisors and overlay technologiesUnselectACLs, AAA, WebAuthUnselectQuestion 2 of 50 3. The First Hop Redundancy Protocols such as HSRP, GLBP and VRRP provide redundancy for which OSI layer?Layer 1Layer 2Layer 3Layer 4Question 3 of 50 4. Trustsec and Spine-leaf design can help build highly available networksTrueFalseQuestion 4 of 50 5. Which of the following statements about HSRP are not true?The HSRP virtual MAC is always 0000.0a07.0c01The HSRP virtual MAC is always 0000.0c07.ac01HSRP has two versionsHSRP for IPv4 and IPv6 can be enabled at the same timeQuestion 5 of 50 6. Cisco's propriety Auto-RP can be used to automatically discover and set the RP for the Reverse Path Forwarding (RPF) checkTrueFalseQuestion 6 of 50 7. You have configured a First HP Redundancy Protocol (FHRP) on a Cisco router as shown belowinterface gi0/0ip address 192.168.10.5 255.255.255.0no shutdownstandby 1 ip 192.168.10.1Which FHRP protocol you have configured as per above configuration?HSRPVRRPGLBPNone of the aboveQuestion 7 of 50 8. You are working as a network engineer in a company. You have been asked to set up a wireless network for 500 clients at the branch office. You have received 30 access points to be installed at the branch office and one Cisco wireless LAN controller to be installed at the main office. Which wireless solution is the best to manage branch office access points?Cloud-basedFlexConnectLocalMonitorQuestion 8 of 50 9. Which of the following are the components of SD-WAN solution?vSmart ControllersvBond OrchestratorvEdge RouterAll of the aboveQuestion 9 of 50 10. What are some of the advantages of SD-WAN over Traditional WAN?WAN virtualizationShorter deployment timesLower operational costsAll of the aboveQuestion 10 of 50 11. Match the QoS term with its descriptionBest Effort Uses classification and markingUnselectThere is no guaranteed delivery of packetsUnselectSignaling protocol is needed and bandwidth is reservedUnselectIntServ Uses classification and markingUnselectThere is no guaranteed delivery of packetsUnselectSignaling protocol is needed and bandwidth is reservedUnselectDiffServ Uses classification and markingUnselectThere is no guaranteed delivery of packetsUnselectSignaling protocol is needed and bandwidth is reservedUnselectQuestion 11 of 50 12. Match Cisco Wireless LAN Controller QoS profile with its descriptionBronze For Video ApplicationsUnselectFor Best EffortUnselectFor Voice ApplicationsUnselectFor BackgroundUnselectGold For Video ApplicationsUnselectFor Best EffortUnselectFor Voice ApplicationsUnselectFor BackgroundUnselectPlatinum For Video ApplicationsUnselectFor Best EffortUnselectFor Voice ApplicationsUnselectFor BackgroundUnselectSilver For Video ApplicationsUnselectFor Best EffortUnselectFor Voice ApplicationsUnselectFor BackgroundUnselectQuestion 12 of 50 13. Which congestion management technique separates traffic into classes and forwards packets according to the class priority?CBWFQRound RobinFIFOCustom QueueingQuestion 13 of 50 14. Cisco Express Forwarding (CEF) leverages which of the following tables to make fast forwarding decisions?ARP tableMAC address tableFIB Adjacency tableQuestion 14 of 50 15. Examine the following line of configuration from a Cisco routerR1(config)#crypto isakmp key cisco321 address 192.168.10.5What is the purpose of the above command?It will configure the pre-shared key required for a GRE tunnelIt will configure the pre-shared key required for an IPsec tunnelIt will generate the RSA key for SSHIt will generate the RSA key for IPsecQuestion 15 of 50 16. Put the IPSec configuration steps in the correct order Configure the require transform-set Configure IPSec tunnel policy Configure and apply the crypto map Configure the pre-shared key Question 16 of 50 17. A packet will be dropped if the DF bit set is sent across a GRE tunnel and the packet size exceeds the link MTUTrueFalseQuestion 17 of 50 18. Which command provides the following output? show crypto profileshow crypto ipsec profileshow crypto isakmp profileshow cryptoQuestion 18 of 50 19. Which of the following commands are used to verify the status of IPsec tunnel?show crypto isakmp sashow crypto ipsec sashow crypto sashow ipsec saQuestion 19 of 50 20. Which of the following configuration attributes must be same for the group of switches in a Multiple Spanning Tree (MST) region?MST Configuration nameMST configuration revision numberMST instance to VLAN mapping tableAll of the aboveQuestion 20 of 50 21. Which of the following dynamic routing protocol combines the simplicity of Distance Vector with the fast convergence of a Link State protocol?IS-ISEIGRPRIPBGPQuestion 21 of 50 22. Which of the following statements are true regarding the below commands?spanning-tree mst 1 root primaryinstance 1 vlan 1211-1219It will make a switch the root bridge for VLANs 1211 to 1219These commands represent MST configurationThese commands represent STP configurationThese commands represent RSTP configurationQuestion 22 of 50 23. Examine the output belowWhat does 'O' indicate in the above output? Connected StaticAn inter area routeAn intra area routeQuestion 23 of 50 24. In OSPF, Type 1 LSAs are inter-area routes and Type 2 LSAs are intra-area routesTrueFalseQuestion 24 of 50 25. Put the OSPF states in the correct order Full Exchange Exstart Two way Loading Question 25 of 50 26. Which of the following conditions must be met in order for two routers to become OSPF neighbours?Same area IDSame hello and dead timerBoth routers must be on the same subnetAll of the aboveQuestion 26 of 50 27. Which commands are required to configure an iBGP peering with R2?Use BGP ASN 65000router bgp 65000neighbor 192.168.10.2 remote-as 65000network 192.168.10.0 255.255.255.0neighbor 192.168.10.2 update-source gi0/0Question 27 of 50 28. Which of the following statements are true about the administrative distance of BGP?Both iBGP and eBGP administrative distance is the sameiBGP administrative distance is 200eBGP administrative distance is 20BGP administrative distance is 100Question 28 of 50 29. Below command is used to troubleshoot BGP neighbour adjacency issues?R1#debug ip bgp unicast TrueFalseQuestion 29 of 50 30. Which command you can use to advertise the prefix 10.230.5.0/24 into BGP?network 10.230.5.0/24network 10.230.5.0 mask 255.255.255.0redistribute 10.230.5.0/24redistribute connectedQuestion 30 of 50 31. Examine the following BGP configurationrouter bgp 65000router-id 192.168.10.1neighbor 192.168.10.2 remote-as 65000neighbor 192.168.10.3 remote-ad 65001Which part of the configuration differentiates whether a BGP peering is made through iBGP or eBGP?Autonomous System Number (ASN)Neighbour IP addressRouter-idNone of the aboveQuestion 31 of 50 32. You have two routers connected directly as shown belowYou want to set R1 as an NTP authoritative time server and R2 as an NTP client. Which two commands would fulfil this requirement?R1(config)#ntp master 1R2(config)#ntp server 192.168.10.1R2(config)#ntp client 192.168.10.1R1(config)#ntp 192.168.10.1 masterQuestion 32 of 50 33. Which commands are not valid to verify, if the device has synchronized with the NTP server?show ntp informationshow ntp statusshow ntp packetsshow ntp associationsQuestion 33 of 50 34. Which command provides the following output?sh ip nat bindingssh ip nat portblock dynamicshow ip nat statisticsshow ip nat translationsQuestion 34 of 50 35. Which of the following commands can be used on a Cisco device to see what traffic has been sent over NetFlow?show ip flowsh ip flow top-talkersshow ip netflowshow ip cache flowQuestion 35 of 50 36. The traceroute command in Cisco IOS could help diagnose which device between you and the target device could be causing the network issueTrueFalseQuestion 36 of 50 37. You have configured a syslog server with an IP address 192.168.10.5. Which command on the Cisco router can be used to send log messages to the configured syslog server?logging ip 192.168.10.5logging host 192.168.10.5logging syslog 192.168.10.5logging 192.168.10.5Question 37 of 50 38. Which of the following commands would start the IP SLA test after one hour and has it run forever?ip sla schedule 10 start-time 1:00 life foreverip sla schedule 10 start-time one life foreverip sla start 10 start-time 1:00 life foreverip sla schedule 10 start-time one-hour life foreverQuestion 38 of 50 39. Under which tab in the Cisco DNA Center would you be able to add network, subnet details, DHCP, SNMP and also configure syslog server?DesignProvisionAssurancePolicyQuestion 39 of 50 40. Match the Cisco DNA Center tabs with the correct descriptionDesign Contains a repository to manage all IOS images of your network devicesUnselectUnder this tab, you will find network device inventoryUnselectUnder this tab, you can create virtual networks and required access controlUnselectWhole network monitoring artifacts are listed hereUnselectPolicy Contains a repository to manage all IOS images of your network devicesUnselectUnder this tab, you will find network device inventoryUnselectUnder this tab, you can create virtual networks and required access controlUnselectWhole network monitoring artifacts are listed hereUnselectProvision Contains a repository to manage all IOS images of your network devicesUnselectUnder this tab, you will find network device inventoryUnselectUnder this tab, you can create virtual networks and required access controlUnselectWhole network monitoring artifacts are listed hereUnselectAssurance Contains a repository to manage all IOS images of your network devicesUnselectUnder this tab, you will find network device inventoryUnselectUnder this tab, you can create virtual networks and required access controlUnselectWhole network monitoring artifacts are listed hereUnselectQuestion 40 of 50 41. RESTCONF protocol allows data to be encoded with which of the following data format encodings?JSONYANGNETCONFXMLQuestion 41 of 50 42. What command allows you to direct the Local SPAN traffic (configured to monitor traffic in monitor session 1)to a port analyzer attached to gi0/0?monitor session 1 destination interface gi0/0monitor session 1 interface gi0/3monitor session 1 destination-interface gi0/3monitor session destination interface gi0/0Question 42 of 50 43. What are some of the benefits provided by Cisco Firepower Next-Generation Firewall (NGFW)?Threat preventionAdvanced Malware Protection (AMP)Application controlAll of the aboveQuestion 43 of 50 44. Which protocol in WPA3 replaces the Wi-Fi Protected Setup (WPS) feature of WPA2?Wi-Fi Device Provisioning Protocol (DPP)GCMP-256 encryptionEAP-LEAPWi-Fi Protected Setup Version 2 (WPS2)Question 44 of 50 45. Which of the following features are provided by security technology Talos?Security intelligenceProvides threat updates from multiple vendorsIdentifies, investigates, and documents new threatsAll of the aboveQuestion 45 of 50 46. Which of the following configuration management tools use an agent-based architecture?PuppetChefAnsiblePythonQuestion 46 of 50 47. One of the benefits of using Python to automate network tasks is that it can run multiple commands across a lot of devices and efficiently TrueFalseQuestion 47 of 50 48. What does Ansible call a reusable, code-based piece of the instructions written in YAML language?PlaybookCookbookJinja2JSONQuestion 48 of 50 49. Which are some of the challenges solved by using Puppet as a configuration management tool?Deploying servers with consistent base configurationsAutomating day to day server administration tasksRemediating inconsistent configurationsProvides the best solution to scale deploymentsQuestion 49 of 50 50. Match the Chef related terms with the correct descriptionResource A collection of resources that determine the configuration or policy of a nodeUnselectA set of configuration commands for a network deviceUnselectA set of recipes grouped together UnselectAn ordered list of recipes that should be run against a deviceUnselectRecipe A collection of resources that determine the configuration or policy of a nodeUnselectA set of configuration commands for a network deviceUnselectA set of recipes grouped together UnselectAn ordered list of recipes that should be run against a deviceUnselectCookbook A collection of resources that determine the configuration or policy of a nodeUnselectA set of configuration commands for a network deviceUnselectA set of recipes grouped together UnselectAn ordered list of recipes that should be run against a deviceUnselectRunlist A collection of resources that determine the configuration or policy of a nodeUnselectA set of configuration commands for a network deviceUnselectA set of recipes grouped together UnselectAn ordered list of recipes that should be run against a deviceUnselectQuestion 50 of 50 Loading...