CCNP ENCOR 4.0 Network Assurance

1. Both routers and switches have a main CPU that executes the processes that constitute the Cisco IOS Software.
Routers can be classified into three categories. In this category, routers have a separate control and data plane, and a single CPU to manage the control plane, and an ASIC that has been designed with the only purpose to forward packets very fast. When the ASIC cannot forward a packet it punts it to the CPU
2. When a device has completed the boot process, the CPU has two distinct functions. What are these ? (Choose 2)
3. It is recommended to investigate if the CPU interrupt percentage is above 10%. (True or False)?
4. When your router's cpu utilization reaches to about 80%, this is an indication that packets are being punted to the CPU.
Which of these options could be the cause ? (Choose 3).
5. The show memory command displays the amount of processor memory and I/O memory that is in use and available (free). I/O memory is used for ________ ?
6. If you see a MALLOCFAIL syslog message, what severity is it mapped to?
7. This filter expression matches the character at the beginning of the string. What is it?
8. The ping command is a very common method for troubleshooting the accessibility of devices. It uses a series of Internet Control Message Protocol (ICMP) Echo messages to determine the following.
(Choose 3)
9. You are trying to troubleshoot a reachability issue using ping.
When you send a ping to an IP address, you are getting this response - MMMMM .

What does this response mean ?
10. What command can you use to determine the maximum MTU size across the network?
11. It refers to another way of narrowing down the output of a debug command .
12. What are the two main components of SNMP?
13. This SNMPv2 added a complex security model, which was never widely accepted.
Instead a “lighter” version of SNMPv2, known as _____________ ?
14. SNMPv3 introduces three levels of security. What are those? (Choose 3).
15. Refers to the command needed to monitor the syslog in AUX and VTY ports.
16. What happens if you set this command for logging?

logging trap warning
17. It refers to the components required by Netflow. What are those? (Choose 3)
18. Refers to the use cases applicable for Netflow? (Choose 3)
19. In an enterprise network, where is the best place in the network to implement Netflow?
20. Before you configure Netflow, you need to consider the following . (Choose 3)
21. In SPAN, two types of ports are being configured. What are those?
22. You have two data centers separate with a layer 3 network in between.
You need to capture traffic from a certain port in DC-1 and wants it to be forwarded to a sniffer server in DC-2.
Which type of SPAN can you use for this?
23. A _______________ is a contract between a network provider and its customers, or between a network department and its internal corporate customers.
It provides a form of guarantee to customers about the level of user experience.
24. Refer to the common protocols used by Cisco IOS routers for IP SLA? (Choose 3)
25. It refers to the common IP SLA Use cases. (Choose 3)
26. Cisco Digital Network Architecture (DNA) is an open, software-driven architecture that is built on a set of design principles, with the objective of providing the following: (Choose 3)
27. ______________ is a complete software-based network automation and assurance solution and is the dashboard for control and management of Cisco’s intent-based networking system in the enterprise campus.
28. You can define user and device profiles that facilitate highly secure access and network segmentation based on business needs.
Application policies allow your business-critical applications to provide a consistent level of performance regardless of network congestion.
Which Cisco DNAC feature that this refer to?
29. This feature of Cisco DNA Center enables every point on the network to become a sensor, sending continuous streaming telemetry on application performance and user connectivity in real time.
This, coupled with automatic path trace visibility and guided remediation, means that network issues are resolved in minutes—before they become problems.
30. In Cisco DNA Center, what are the 3 ways to discover devices. (Choose 3)
31. In DNA Center, before you run a discovery, the SNMP credential is not required.
32. A ________________ is a validated image that meets the compliance requirements for the particular device type.
33. In Cisco DNAC, it is built to support the scale of global customers while easily supporting customers with local or regional networks. With globally distributed sites, you come across various challenges, such as networks being managed by regions, multiple network operations teams working on your network, and differences in network designs.
34. In Cisco DNAC, the Cisco ________ application is used for device onboarding.
Once powered on, the devices securely connect to the Cisco DNA Center and need to be claimed using this application.
35. In Cisco DNAC, it allows a 360 degree view of your entire network and also shows the overall health of the network infrastructure and clients.
You can get an end to end visibility and detailed health information of your network using the application.
36. In Cisco DNAC, it is an application that permits you to run diagnostic CLI commands on selected devices and view the results.
37. In DNAC,it is a feature that allows you to follow network path for any traffic flow from any source to destination.
You can gather detailed information for all devices and interfaces in the path.
38. What feature must be enabled in the devices to enable AppX (Application Experience) in DNAC?
39. It refers to the protocol stack of NETCONF?
40. NETCONF messages are encoded in ____ and based on remote procedure call-based communication .
41. Which two of the following options are the main data encoding formats that are commonly used in Application Programming Interfaces? (Choose 2)
42. In RESTCONF, it refers to the method that retrieves data and metadata for a resource. It is supported for all resource types, except operation resources.
43. in NETCONF, it loads all or part of a specified configuration to the specified device.
44. NETCONF and RESTCONF have been developed to fix the caveats of which protocol?
45. A data modelling language that is used to model configuration and operational features . It determines the scope and the kind of functions that can be performed by NETCONF and RESTCONF APIs.
46. It is a stateless protocol that uses secure HTTP methods to provide CREATE, READ, UPDATE and DELETE (CRUD) operations on a conceptual datastore containing YANG-defined data.
47. NETCONF uses a simple __________________ based mechanism to facilitate communication between a client and a server
48. In IP SLA, NTP synchronization between devices is not required.
49. In the Remote SPAN Implementation, the SPAN vlan must be the same on the source and destination switches.
50. Which encapsulation protocol is used in Encapsulated RSPAN ?


Leave a comment