Cisco ENCOR

FREE Cisco ENCOR 350-401 Trivia Question and Answers

0%

What job does a fabric edge node have in an SD-Access setup?

Correct! Wrong!

In an SD-Access (Software-Defined Access) setup, a fabric edge node plays a crucial role in connecting endpoints to the fabric and forwarding their traffic. It serves as the access layer in the SD-Access architecture and is responsible for providing connectivity to end-user devices and IoT devices.

What command is entered into a router to enable an EEM applet?

Correct! Wrong!

The router(config)# event manager applet enable command can be used to enable an EEM applet on a router.

Which component of the Cisco SD-Access wireless architecture controls endpoint ID to edge node bindings?

Correct! Wrong!

In the Cisco SD-Access wireless architecture, the component that controls endpoint ID to edge node bindings is the "fabric control plane node."

The fabric control plane node plays a central role in managing the control plane of the SD-Access fabric. It is responsible for overseeing various control plane functions, including the mapping and resolution of endpoint IDs to the corresponding edge nodes in the fabric.

Applying an IPv6 ACL to an interface requires what Cisco IOS command?

Correct! Wrong!

You can apply an existing IPv6 ACL to an interface in either the in or out direction with the ipv6 traffic-filter command.

What categories does LISP divide IP addresses into?

Please select 2 correct answers

Correct! Wrong!

LISP divides IP addresses into route locators and endpoint identifiers (EIDs) (RLOCs).

Inputting the command clear ip route * causes a network administrator to get the notice "Please update the network documentation to record why the ip routing table was cleaned." What router function was employed in this instance?

Correct! Wrong!

Sending messages to the console based on certain commands input is one of EEM's functions. None of the alternate choices will offer that function.

In a Cisco SD-WAN configuration, what is a VPN?

Correct! Wrong!

In a Cisco SD-WAN (Software-Defined Wide Area Network) configuration, a VPN (Virtual Private Network) refers to a virtualized environment that provides traffic isolation and segmentation within the SD-WAN fabric.

What is one truth about the use of Cisco SD-Access in wireless networks?

Correct! Wrong!

One truth about the use of Cisco SD-Access in wireless networks is that "the access point is part of the fabric overlay."

In Cisco SD-Access, the fabric overlay extends to wireless networks, allowing seamless integration and management of wired and wireless endpoints within the same fabric. This means that wireless access points (APs) are considered an integral part of the SD-Access fabric and are treated as part of the overlay network.

What do solutions for application whitelisting serve?

Correct! Wrong!

To stop unauthorized apps from being installed or run on an endpoint, application whitelisting solutions are used. It does not safeguard an endpoint from network risks, identify and prevent harmful applications, or track and manage user activity.

Which action would be considered a design best-practice for the core layer in a three-tier hierarchical campus network design?

Correct! Wrong!

The action that would be considered a design best-practice for the core layer in a three-tier hierarchical campus network design is to "provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence."

What kind of Wi-Fi encryption technique does pre-shared key (PSK) authentication normally employ?

Correct! Wrong!

To achieve the highest level of security, Advanced Encryption Standard (AES) is often employed with Pre-Shared Key (PSK) authentication.

What control plane protocol is employed between vSmart controllers and Cisco SD-WAN routers?

Correct! Wrong!

The control plane protocol employed between vSmart controllers and Cisco SD-WAN routers is "OMP" (Overlay Management Protocol).

OMP is a key control plane protocol in the Cisco SD-WAN (Software-Defined Wide Area Network) architecture. It is used for communication and coordination between the centralized vSmart controllers and the edge routers (also known as vEdge routers) deployed at remote locations.

Which two network issues warrant implementing Quality of Service (QoS) in a college network? (Select two.)

Please select 2 correct answers

Correct! Wrong!

Network functions from proprietary hardware-based appliances can be decoupled and run on x86 servers that are more commonly found. What is the ETSI-created standard that governs this procedure?

Correct! Wrong!

The European Telecommunications Standards Institute (ETSI) developed the architectural framework known as "Network Functions Virtualization" (NFV) to define standards for decoupling network functions from proprietary hardware-based appliances and allowing them to run in software on common x86 servers. It also specifies how to coordinate and manage network operations.

The vSmart controller is in charge of what in an SD-WAN deployment?

Correct! Wrong!

In an SD-WAN (Software-Defined Wide Area Network) deployment, the vSmart controller is in charge of distributing security information for tunnel establishment between vEdge routers. The vSmart controller is a centralized management and control plane element in the SD-WAN architecture. It plays a critical role in overseeing the entire SD-WAN fabric and facilitating communication and coordination among the various SD-WAN devices, including vEdge routers, vBond orchestrators, and vManage network management system.

What function does a fusion router serve in an SD-Access system?

Correct! Wrong!

In an SD-Access (Software-Defined Access) system, a fusion router serves the function of performing route leaking between user-defined virtual networks and shared services.

Route leaking is a mechanism that allows the exchange of routing information between different virtual networks or VPNs (Virtual Private Networks) within the SD-Access fabric. It enables communication between endpoints located in separate virtual networks, facilitating connectivity and data exchange across different network segments.