CCNP350-401学习笔记(251-300题)

news2024/9/22 7:26:46

251、

Which IPv6 OSPF network type is applied to interface Fa0/0 of R2 by default?
A. multipoint
B. broadcast
C. Ethernet
D. point-to-point 

252、Which EIGRP feature allows the use of leak maps?
A. neighbor
B. Stub
C. offset-list
D. address-family

253、Which two statements about EIGRP load balancing are true? (Choose two)
A. Cisco Express Forwarding is required to load-balance across interfaces
B. A path can be used for load balancing only if it is a feasible successor
C. EIGRP supports unequal-cost paths by default
D. Any path in the EIGRP topology table can be used for unequal-cost load balancing
E. EIGRP supports 6 unequal-cost paths

254、Which statement about LISP encapsulation in an EIGRP OTP implementation is true?
A. LISP learns the next hop
B. OTP uses LISP encapsulation to obtain routes from neighbors
C. OTP uses LISP encapsulation for dynamic multipoint tunneling

D. OTP maintains the LISP control plane

255、Which two statements about VRRP are true? (Choose two)
A. It supports both MD5 and SHA1 authentication
B. It is assigned multicast address 224.0.0.9
C. Three versions of the VRRP protocol have been defined
D. It is assigned multicast address 224.0.0.8
E. The TTL for VRRP packets must be 255
F. Its IP address number is 115

256、Which two statements about HSRP are true? (Choose two)
A. It supports unique virtual MAC addresses
B. Its virtual MAC is 0000.0C07.ACxx
C. Its default configuration allows for pre-emption
D. It supports tracking
E. Its multicast virtual MAC is 0000.5E00.01xx

257、What are three valid HSRP states? (Choose three)
A. INIT
B. listen

C. full
D. learing
E. speak
F. established

258、Which two statements about IP SLA are true? (Choose two)
A. It uses NetFlow for passive traffic monitoring
B. It can measure MOS
C. The IP SLA responder is a component in the source Cisco device
D. It is Layer 2 transport-independent
E. It uses active traffic monitoring
F. SNMP access is not supported

259、

Refer to the exhibit. Which two statements about the EEM applet configuration are true? (Choose two.)                CLI;before
A. The EEM applet runs before the CLI command is executed
B. The EEM applet runs after the CLI command is executed
C. The EEM applet requires a case-insensitive response
D. The running configuration is displayed only if the letter Y is entered at the CLI.

260、 Refer to the exhibit. Which network script automation option or tool is used in the exhibit?

A. EEM
B. Python
C. Bash script
D. NETCONF
E. REST 

261、Which data modeling language is commonly used by NETCONF?
A. REST
B. YANG
C. HTML
D. XML

262、Which variable in an EEM applet is set when you use the sync yes option?
A. $_cli_result
B. $_exit_status
C. $_string_result
D. $_result

263、Which IPv6 migration method relies on dynamic tunnels that use the 2002::/16 reserved address space?
A. GRE
B. 6RD
C. 6to4
D. ISATAP

264、A GRE tunnel is down with the error message %TUN-5-RECURDOWN:

Which two options describe possible causes of the error? (Choose two.)
A. Incorrect destination IP addresses are configured on the tunnel.

B. There is link flapping on the tunnel
C. There is instability in the network due to route flapping
D. The tunnel mode and tunnel IP address are misconfigured
E. The tunnel destination is being routed out of the tunnel interface 

265、Refer to the exhibit. An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID.
Which configuration set accomplishes this task?

A. R3(config)#router bgp 200
R3(config-router)#neighbor
10.24.24.4 remote-as 100
R3(config-router)#bgp router-id
10.3.3.3
R4(config)#router bgp 100
R4(config-router)#neighbor 10.24.24.3 remote-as 200
R4(config-router)#bgp router-id 10.4.4.4

B. R3(config)#router bgp 200
R3(config-router)#neighbor 10.4.4.4 remote-as 100
R3(config-router)#neighbor 10.4.4.4 update-source loopback0
R4(config)#router bgp 100
R4(config-router)#neighbor 10.3.3.3 remote-as 200
R4(config-router)#neighbor 10.3.3.3 update-source loopback0
C. R3(config)#router bgp 200
R3(config-router)#neighbor 10.24.24.4 remote-as 100
R3(config-router)#neighbor 10.24.24.4 update-source loopback0
R4(config)#router bgp 100
R4(config-router)#neighbor 10.24.24.3 remote-as 200
R4(config-router)#neighbor 10.24.24.3 update-source loopback0 

266、What is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?
A. ability to operate on hardware that is running other OSs
B. improved security because the underlying OS is eliminated
C. improved density and scalability
D. better application performance

267、In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?
A. Layer 3
B. inter-xTR
C. auto anchor
D. fast roam

268、Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)?
A. 43
B. 66
C. 69
D. 150

269、An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the active HSRP router. The peer router has been configured using the default priority value. Which three commands are required? (Choose three)
A. standby 300 timers 1 110
B. standby 300 priority 90
C. standby 300 priority 110
D. standby version 2

E. standby version 1
F. standby 300 preempt

270、n a traditional 3 tier topology, an engineer must explicitly configure a switch as the root bridge and exclude it from any further election process for the spanningtree domain. Which action accomplishes this task?

A. Configure the spanning-tree priority to 32768
B. Configure root guard and portfast on all access switch ports
C. Configure BPDU guard in all switch-to-switch connections
D. Configure the spanning-tree priority equal to 0

271、Refer to the exhibit.

Cisco DNA Center has obtained the username of the client and the multiple devices that the client is using
on the network. How is Cisco DNA Center getting these context details?
A. Those details are provided to Cisco DNA Center by the Identity Services Engine
B. The administrator had to assign the username to the IP address manually in the user database tool on Cisco DNA Center
C. User entered those details in the Assurance app available on iOS and Android devices
D. Cisco DNA Center pulled those details directly from the edge node where the user connected 

272、Which QoS queuing method transmits packets out of the interface in the order the packets arrive?
A. custom
B. weighted- fair
C. FIFO
D. priority

273、Refer to the exhibit

Which command must be applied to Router1 to bring the GRE tunnel to an up/up state?
A. Router1(config-if)#tunnel source Loopback0
B. Router1(config-if)#tunnel source GigabitEthernet0/1
C. Router1(config-if)#tunnel mode gre multipoint
D. Router1(config)#interface tunnel0 

274、Refer to the exhibit.

Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?
A. line vty 0 15
exec-timeout 10 0
B. line vty 0 15
exec-timeout
C. line vty 0 15
absolute-timeout 600
D. line vty 0 4
exec-timeout 600

275、A wireless consultant is designing a high-density wireless network for a lecture hall for 1000 students.
Which antenna type is recommended for this environment?
A. sector antenna
B. dipole antenna
C. parabolic dish
D. omnidirectional antenna

276、Refer to the exhibit. How can you configure a second export destination for IP address 192.168.10.1?

A. Specify a different TCP port
B. Specify a different UDP port
C. Specify a VRF
D. Configure a version 5 flow-export to the same destination
E. Specify a different flow ID

277、Refer to exhibit. What are two reasons for IP SLA tracking failure? (Choose two )

A. The source-interface is configured incorrectly
B. The destination must be 172.30.30.2 for icmp-echo
C. A route back to the R1 LAN network is missing in R2
D. The default route has wrong next hop IP address
E. The threshold value is wrong

278、 Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?

A. VXLAN
B. IS-IS
C. OSPF
D. LISP

279、Refer to the exhibit.

 An engineer entered the no spanning-tree bpduguard enable on interface fa1/0/7 command. Which
statement describes the effect of this command?
A. Fa1/0/7 remains in err-disabled state until the shutdown/no shutdown command is entered in the interface configuration mode
B. Interface Fa1/0/7 remains in err-disabled state until the errdisable recovery cause bpduguard command is entered in the interface configuration mode
C. Fa1/0/7 remains in err-disabled state until the errdisable recovery bpduguard command is entered in the interface configuration mode
D. Interface Fa1/0/7 remains in err-disabled state until the spanning-tree portfast bpduguard disable command is entered in the interface configuration mode
E. Interface Fa1/0/7 returns to an up and operational state

280、Refer to the exhibit.

On which interfaces should VRRP commands be applied to provide first hop redundancy to PC-01 and PC-02?
A. G0/0 on Edge-01 and G0/0 on Edge-02
B. G0/1 on Edge-01 and G0/1 on Edge-02
C. G0/0 and G0/1 on Core
D. G0/0 and G0/1 on ASW-01 

281、Refer to the exhibit.

Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?
A. ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 global
ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 global
ip route 192.168.1.0 255.255.255.0 Vlan10
ip route 172.16.1.0 255.255.255.0 Vlan20

B. ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 Customer2
ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 Customer1
C. ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 Customer1
ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 Customer2
D. ip route vrf Customer1 172.16.1.1 255.255.255.255 172.16.1.1 global
ip route vrf Customer2 192.168.1.200 255.255.255.0 192.168.1.1 global
ip route 192.168.1.0 255.255.255.0 Vlan10
ip route 172.16.1.0 255.255.255.0 Vlan20 

282、Refer to the exhibit.

Which password allows access to line con 0 for a username of “tommy” under normal operation?
A. Cisco
B. local
C. 0 Cisco
D. Tommy

283、 Which tunneling technique is used when designing a Cisco SD-Access fabric data plane?A. VXLAN
B. VRF Lite
C. VRF
D. LISP

284、An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172.16.50.5/24.
The engineer must register 50 new Cisco AIR-CAP2802IE-K9 access points to the WLC using DHCP option 43.
The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows

The access points are failing to join the wireless LAN controller. Which action resolves the issue?
A. configure option 43 Hex F104.AC10.3205
B. configure option 43 Hex F104.CA10.3205
C. configure dns-server 172.16.50.5
D. configure dns-server 172.16.100.1 

285、Why would a log file contain a * next to the date?
A. The network device is not configured to use NTP time stamps for logging
B. The network device was unable to reach the NTP server when the log messages were recorded.
C. The network device is not configured to use NTP
D. The network device was receiving NTP time when the log messages were recorded

286、Refer to the exhibit.

A GRE tunnel has been created between HQ and BR routers. What is the tunnel IP on the HQ router?
A. 209.165.202.130
B. 10.111.111.2
C. 10.111.111.1
D. 209.165.202.134 

287、Refer to the exhibit.

Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?         C

 288、A customer has deployed an environment with shared storage to allow for the migration of virtual machines between servers with dedicated operating systems that provide the virtualization platform. What is this operating system described as?
A. hosted virtualization
B. type 1 hypervisor
C. container oriented
D. decoupled

289、Refer to the exhibit.

What is the JSON syntax that is formed from the data?
A. Make”:’Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}
B. (“Make”:[ “Gocar”, “Model”: “Zoom”], Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]}
C. {“Make”: Gocar, “Model”: Zoom, “Features”: Power Windows, Manual Drive, Auto AC}
D. {“Make”: “Gocar”, “Model”: “Zoom”, “Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]}

290、 In OSPF, which LAS type is responsible for pointing to the ASBR router?
A. type 1
B. type 2
C. type 3
D. type 4

291、An engineer is configuring GigabitEthernet1/0/0 for VRRP. When the router has the highest priority In group 5, It must assume the master role. Which command set should the engineer add to the configuration to accomplish this task?
interface GigabitEthernet1/0/0
description To IDF A 38-72-100-76
ip address 172.16.13.2 255.255.255.0
A. standby 5 ip 172.16.13.254
standby 5 priority 100
standby 5 preempt
B. vrrp 5 ip 172.16.13.254 255.255.255.0
vrrp 5 track 1 decrement 10
vrrp preempt
C. standby 5 ip 172.16.13.254
standby 5 priority 100
standby 5 track 1 decrement 10
D. vrrp 5 ip 172.16.13.254

vrrp 5 priority 100

292、Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session?
A. HTTP Status Code 200
B. HTTP Status Code 302
C. HTTP Status Code 401
D. HTTP Status Code: 504

293、Drag and drop the LIPS components on the left to the correct description on the right.

294、

 Refer to the exhibit,which configuration must be applied to R1 to enbale R1 to reach the server at
172.16.0.1 ?
A. interface Ethernet 0/0
vrf forwarding hotel
ip address 172.16.0.7 255.255.0.0
router ospf 44 vrf Hotel
network 172.16.0.0 0.0.255.255 area 0
B. interface Ethernet 0/0
vrf forwarding
bank
ip address 172.16.0.7 255.255.0.0
router ospf 44 vrf
bank
network 172.16.0.0 0.0.255.255 area 0

C. interface Ethernet 0/0
ip address 172.16.0.7 255.255.0.0
router ospf 44 vrf Hotelnetwork 172.16.0.0 0.0.255.255 area 0
D. interface Ethernet 0/0
ip address 172.16.0.7 255.255.0.0
router ospf 44 vrf bank
network 172.16.0.0 0.0.255.255 area 0

295、Refer to the exhibit.What does the snippet of code achive?

A. It opens an ncclient connection to a cisco Nexus device and maintains it for the duration of the context
B. It creates an SSH connection using the SSH key that is stored,and the password is ignored
C. It opens a tunnel and encapsulates the login information,if the host key is correct
D. It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls 

296、Using the EIRP formula.what parameter is subtracted to determine the EIRP value ?
A. transmitter power
B. antenna cable loss
C. antenna gain
D. signal-to-noise ratio

297、In Cisco SD-WAN,which protocol is used to measure link quality ?
A. BFD
B. RSVP
C. IPsec
D. OMP

298、Refer to the exhibit. Which level message does the WLC send to the syslog server?

A. syslog level errors and less severity messages
B. syslog level errors messages
C. all syslog levels messages
D. syslog level errors and greater severity messages 

299、Refer to the exhibit.

An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing
phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?
A. The server that is providing the portal has an expired certificate
B. The server that is providing the portal has a self-signed certificate
C. The connection is using an unsupported protocol
D. The connection is using an unsupported browser

300、 Drag and drop the characteristics from the left onto the QoS components they describe on the right.

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.coloradmin.cn/o/359406.html

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈,一经查实,立即删除!

相关文章

IMS应用领域|IMS连接器系统使自动驾驶成为可能

IMS连接器系统使自动驾驶成为可能极高的创新力和绝对的产品质量:作为高频接插件接口的创新性开发合伙人,我们的产品满足汽车工业对信息娱乐、娱乐、远程信息处理技术、车载电脑和智能汽车天线等不同产品解决方案的多种要求。我们为确保系统的可靠性做出了…

【学习笔记】Docker(一)

Docker为什么会出现?问题:环境配置最初开发上线都需要配置,并且非常麻烦。每一个机器都需要部署环境——费时费力、我在我的电脑上可以运行、版本更新,导致服务不可用传统:开发打包jar包交给运维来做现在:开…

面试经常被问悲观锁和乐观锁?什么是cas?来我花3分钟时间告诉你

锁大家都知道吧,多线程访问资源会存在竞争,那么就需要加锁进而让多个线程一个一个访问。 比如有一个房间,一次只能进一个人,现在有十个人都想进去怎么办? 对,加锁。拿一把钥匙,谁抢到钥匙谁就…

5.4 BGP地址聚合

5.3.1配置BGP地址聚合 1. 实验目的 熟悉BGP地址聚合的应用场景掌握BGP地址聚合的配置方法2. 实验拓扑 实验拓扑如图5-4所示: 图5-4:配置BGP地址聚合 3. 实验步骤 (1)配置IP地址 R1的配置 <Huawe…

skywalking window版使用

文章目录 目录 文章目录 前言 一、skywalking 二、使用步骤 2.1 使用mysql持久化监控数据 2.2 接入到idea的单个微服务和多个微服务 2.3 自定义skywalking的链路追踪 总结 前言 skywalking是一个国产开源框架&#xff0c;是分布式系统的应用程序性能监视工具&#xff0c;专为…

python基于django电影院购票系统(含选座功能

可定制框架:ssm/Springboot/vue/python/PHP/小程序/安卓均可开发 目录 1 绪论 1 1.1课题背景 1 1.2课题研究现状 1 1.3初步设计方法与实施方案 2 1.4本文研究内容 2 2 系统开发环境 4 2.项目介绍影城管理系统的主要使用者分为管理员和用户&#xff0c;实现功能包括管理员&…

UVM实战--加法器

前言 这里以UVM实战&#xff08;张强&#xff09;第二章为基础修改原有的DUT&#xff0c;将DUT修改为加法器&#xff0c;从而修改代码以使得更加深入的了解各个组件的类型和使用。 一. 组件的基本框架 和第二章的平台的主要区别点 &#xff08;1&#xff09;有两个transactio…

全15万字丨PyTorch 深度学习实践、基础知识体系全集;忘记时,请时常回顾。

✨ ✨我们抬头便看到星光&#xff0c;星星却穿越了万年. ✨ ✨ &#x1f3af;作者主页&#xff1a;追光者♂ &#x1f338;个人简介&#xff1a;在读计算机专业硕士研究生、CSDN-人工智能领域新星创作者&#x1f3c6;、2022年度博客之星人工智能领域TOP4&#x1f31f;、阿里云…

国产哪种蓝牙耳机最好?口碑最好的国产蓝牙耳机推荐

随着近几年蓝牙耳机的飞速发展&#xff0c;国产蓝牙耳机也逐渐突破技术壁垒&#xff0c;被更多用户熟知、认可。但&#xff0c;国产蓝牙耳机品牌的多样化&#xff0c;也为人们的选择增添了不少困难。那么&#xff0c;国产哪种蓝牙耳机最好&#xff1f;下面&#xff0c;我来给大…

详解可变形注意力模块(Deformable Attention Module)

Deformable Attention&#xff08;可变形注意力&#xff09;首先在2020年10月初商汤研究院的《Deformable DETR: Deformable Transformers for End-to-End Object Detection》论文中提出&#xff0c;在2022CVPR中《Vision Transformer with Deformable Attention》提出应用了De…

JavaEE简单示例——再插入的同时获取插入的主键列

简单介绍&#xff1a; 在某些时候&#xff0c;我们在插入完成一条语句之后&#xff0c;我们会想要返回之前插入的这条语句的主键列的数据&#xff0c;进行下一步的展示或者修改&#xff0c;我们就可以使用MyBatis的主键回写功能&#xff0c;帮助我们获取插入成功的一条数据的主…

Microsoft Dynamics 365:导入License到服务层,通过Business Central Administration Shell

本文主要是Microsoft Dynamics 365的License导入的图解干货&#xff0c;不多赘述&#xff0c;直接上图&#xff1a;第一步&#xff1a;准备好的License文件放在你喜欢的目录下第二步&#xff1a;到开始程序里找到并打开 Business Central Administration Shell3.第三步&#xf…

klog bug:仅输出到日志文件,不打印到命令行/stderr

一、 问题描述 开发k8s插件&#xff0c;使用klog作为日志工具&#xff0c;开发完成发现在设置将日志打印到文件后&#xff0c;Error级别的日志信息仍然会输出到命令行&#xff0c;过多日志打印会使后期将服务部署于docker有卡死的风险&#xff08;docker的bug&#xff0c;日志…

美国原装二手keysight E4980A(安捷伦)2MHZ LCR表

Agilent E4980A、Keysight E4980A、LCR 表&#xff0c;20 Hz - 2 MHz E4980A 是 Agilent 的 2 MHz LCR 表。LCR表是一种电子测试设备&#xff0c;用于测量电子元件的电感&#xff08;L&#xff09;、电容&#xff08;C&#xff09;和电阻&#xff08;R&#xff09;。LCR 表可…

W800|iot|HLK-W800-KIT-PRO|AliOS|阿里云| |官方demo|学习(1):板载AliOS系统快速上手

板载系统简介 HLK-W800-KIT-PRO 是海凌科电子面向开发者&#xff0c;采用了联盛德 w800 方案&#xff0c;带有一个RGB三色灯&#xff0c;集成了 CHT8305C 温湿度传感器的多功能开发板&#xff0c;用户可以在上面学习、研究嵌入式系统和物联网产品的开发&#xff0c;本套设备运行…

js中的隐式类型转换有哪些

目录一、隐式类型转换条件二、 的隐式类型转换三、 的隐式类型转换四、object 的隐式类型转换探讨 object 的隐式转换执行顺序探讨 Symbol.toPrimitive 属性如何将对象转换为原始值在前端js这门动态弱类型语言中&#xff0c;不仅存在着显示类型转换&#xff0c;还存在许多隐式类…

原画培训机构排名前十名,最新10大原画培训机构

原画培训机构排名出来啦&#xff0c;最新10大原画培训机构出炉&#xff0c;快来看看游戏原画培训机构有哪些吧&#xff0c;对于不知道如何选择靠谱的原画培训班&#xff0c;可以借鉴和参考一下&#xff01; 1、轻微课 国内人气很高的板绘学习平台&#xff0c;主打课程有日系插…

化解射频和微波设计挑战的六个技巧

即使是最自信的设计人员&#xff0c;对于射频电路也往往望而却步&#xff0c;因为它会带来巨大的设计挑战&#xff0c;并且需要专业的设计和分析工具。这里将为您介绍六条技巧&#xff0c;来帮助您简化任何射频PCB 设计任务和减轻工作压力&#xff01; 1、保持完好、精确的射频…

从全局变量寻找到Tomcat回显方式

前言 对于回显的获取主要是在ApplicationFilterChain类的lastServicedRequest / lastServicedResponse两个属性&#xff0c;是使用的ThreadLocal进行修饰的&#xff0c;并且&#xff0c;在执行请求的过程中&#xff0c;通过反射修改属性值&#xff0c;能够记录下当前线程的req…

nginx 代理01(持续更新)

1、如果请求是post&#xff0c;而且请求原是188.188.3.171&#xff0c;处理方式403 if ($request_method ~* "POST") # $request_method 等同于request的method&#xff0c;通常是“GET”或“POST” # 如果访问request的method值为POST则返回“o” {set…