当前位置: 首页 > news >正文

CCNP350-401学习笔记(401-450题)

401、What is the function of vBond in a Cisco SDWAN deployment?
A. initiating connections with SD-WAN routers automatically
B. pushing of configuration toward SD-WAN routers
C. onboarding of SDWAN routers into the SD-WAN overlay

D. gathering telemetry data from SD-WAN routers

402、Which three resources must the hypervisor make available to the virtual machines? (Choose three)
A. memory
B. bandwidth
C. IP address
D. processor
E. storage
F. secure access

403、How does Protocol Independent Multicast function?
A. In sparse mode it establishes neighbor adjacencies and sends hello messages at 5-second intervals.
B. It uses the multicast routing table to perform the multicast forwarding function.
C. It uses unicast routing information to perform the multicast forwarding function.
D. It uses broadcast routing information to perform the multicast forwarding function.

404、What are two methods of ensuring that the multicast RPF check passes without changing the unicast routing table? (Choose two.)
A. implementing static mroutes
B. disabling BGP routing protocol
C. implementing MBGP
D. disabling the interface of the router back to the multicast source
E. implementing OSPF routing protocol

405、After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?
A. RPVST+
B. RP failover
C. BFD
D. NSF

406、Which two southbound interfaces originate from Cisco DNA Center and terminate at fabric underlay switches? (Choose two)
A. UDP 67: DHCP
B. ICMP: Discovery
C. TCP 23: Telnet
D. UDP 162: SNMP
E. UDP 6007: NetFlow

407、What is the function of a control-plane node in a Cisco SD-Access solution?
A. to run a mapping system that manages endpoint to network device relationships
B. to implement policies and communicate with networks outside the fabric
C. to connect external Layer 3 networks to the SD Access fabric.
D. to connect APs and wireless endpoints to the SD-Access fabric

408、Refer to the exhibit. What is the result when a switch that is running PVST+ is added to this network?

A. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+
B. Both switches operate in the PVST+ mode
C. Spanning tree is disabled automatically on the network
D. Both switches operate in the Rapid PVST+ mode. 

409、What is a characteristic of a next-generation firewall?
A. only required at the network perimeter
B. required in each layer of the network
C. filters traffic using Layer 3 and Layer 4 information only
D. provides intrusion prevention

410、Which measure is used by an NTP server to indicate its closeness to the authoritative time source?

A. stratum
B. hop count
C. time zone
D. latency

411、Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric?(Choose two )
A. All devices reload after detecting loss of connection to Cisco DNA Center
B. Already connected users are unaffected, but new users cannot connect
C. User connectivity is unaffected.
D. Cisco DNA Center is unable to collect monitoring data in Assurance.

E. Users lose connectivity

412、Which two components are supported by LISP? (choose two )
A. proxy ETR
B. egress tunnel router

C. route reflector
D. HMAC algorithm
E. spoke

413、Refer to the exhibit.

What does the output confirm about the switch’s spanning tree configuration?
A. The spanning-tree mode stp ieee command was entered on this switch
B. The spanning-tree operation mode for this switch is PVST
C. The spanning-tree operation mode for this switch is IEEE
D. The spanning-tree operation mode for this switch is PVST+

414、 A customer has recently implemented a new wireless infrastructure using WLC-5520S at a site directly next to a large commercial airport Users report that they intermittently lose Wi-Fi connectivity, and troubleshooting reveals it is due to frequent channel changes Which two actions fix this issue? (Choose two)
A. Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list
B. Restore the OCA default settings because this automatically avoids channel interference
C. Disable DFS channels to prevent interference writ) Doppler radar
D. Enable DFS channels because they are immune to radar interference
E. Configure channels on the UNII-2 and the Extended UNII-2 sub-bands of the 5 Ghz band only

415、What is a characteristic of para-virtualization?

A. Para-virtualization guest servers are unaware of one another
B. Para-virtualization allows direct access between the guest OS and the hypervisor
C. Para-virtualization allows the host hardware to be directly accessed
D. Para-virtualization lacks support for containers

416、A customer requests a network design that supports these requirements:
* FHRP redundancy
* multivendor router environment
* IPv4 and IPv6 hosts
Which protocol does the design include?
A. GLBP
B. VRRP version 2
C. VRRP version 3
D. HSRP version 2

417、Refer to the exhibit. What happens to access interfaces where VLAN 222 is assigned?

A. STP BPDU guard is enabled
B. A description “RSPAN” is added
C. They are placed into an inactive state
D. They cannot provide PoE

418、 Which solution do IaaS service providers use to extend a Layer 2 segment across a Layer 3 network?
A. VXLAN
B. VTEP
C. VLAN
D. VRF

419、What is a characteristic of a next-generation firewall?
A. only required at the network perimeter
B. required in each layer of the network
C. filters traffic using Layer 3 and Layer 4 information only
D. provides intrusion prevention

420、Which unit measures the power of a radio signal with reference to 1 milliwatt?
A. dBw
B. dBi
C. mW
D. dBm

421、Refer to the exhibit. An engineer must deny HTTP traffic from host A to host V while allowing all other communication between the hosts, drag and drop the commands into the configuration to achieve these results.

 

422、What are two benefits of YANG?(choose two)
A. it collects statistical constraint analysis information
B. In enforces the use of specific encoding format for NETCONF
C. in enforces configuration semantics
D. it enables multiple leaf statements to exist within a leaf list
E. it enforces configuration constraints

423、 

 Which configuration change will force BR2 to reach 209.165.201.0/27 via BR1?
A. Set the origin to igp on BR2 toward PE2 inbound
B. Set the local preference to 150 on PE1 toward BR1 outbound
C. Set the weight attribute to 65,535 on BR1 toward PE1
D. Set the MED to 1 on PE2 toward BR2 outbound

424、An engineer must export the contents of the devices object in JSON format. Which statement must be use?

A. json.print(Devices)
B. json.loads(Devices)
C. json.dumps(Devices)
D. json.repr(Devices)

425、 what is the function of Cisco DNA Center in a cisco SD-Access deployment?
A. It is responsible for routing decisions inside the fabric
B. It is responsible for the design,management,deployment,provisioning,and assurance of the fabric network devices
C. It possesses information about all endponints,nodes,and extemal network related to the fabric
D. It provides integration and automation for all noonfabric nodes and their fabric counterparts.

426、

A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task?
A. Add the username admin privilege 15 common-criteria-policy Administrators password 0 Cisco013579! command
B. No further action is required. The configuration is complete

C. Add the aaa authentication enable default Administrators command
D. The password expiry mechanism is on the AAA server and must be configured there 

427、

An engineer troubleshoots connectivity issues with an application. Testing is performed from the server gateway, and traffic with the DF bit set is dropped along the path after increasing packet size. Removing the DF bit setting at the gateway prevents the packets from being dropped. What is the cause of this issue?
A. PMTUD does not work due to ICMP Packet Too Big messages being dropped by an ACL
B. The remote router drops the traffic due to high CPU load
C. The server should not set the DF bit in any type of traffic that is sent toward the network
D. There is a CoPP policy in place protecting the WAN router CPU from this type of traffic 

428、What are two benefits of virtual switching when compared to hardware switching? (Choose two)
A. increased MTU size
B. hardware independence
C. VM-level isolation

D. increased flexibility
E. extended 802.1Q VLAN range

429、

Refer to the exhibit.An engineer configures VRRP and issues the show commands to verify
operation,What does the engineer confirm about VRRP group 1 from the output ?
A. communcation between VRRP members is encrypted using MD5
B. If R1 reboots,R2 becomes the master virtual router until R2 reboots
C. There is no route to 10.10.1.1/32 in R2's routing table
D. R1 is master if 10.10.1.1/32 is in its routing table

430、 Refer to the exhibit.Which single security feature is recommended to provide Network Access Control in the enterprise ?

A. MAB
B. 802.1X
C. WebAuth
D. Port Security sticky MAC 

431、Refer to the exhbit.An engineer must add the SNMP interface table to the NetFlow protocol flow records.where should the SNMP table option be added ?

A. under the interface
B. under the flow record
C. under the flow monitor
D. under the flow exporter

432、Which two operational models enable an AP to scan one or more wireless channels for rouge access points and at the same time provide wireless services to clients? (Choose two)
A. Sniffer
B. Rouge detector
C. Local
D. FlexConnect

E. Monitor

433、How does a router behave when configured with the default DNS lookup settings, and a URL is entered onthe CLI?
A. prompts the user to specify the desired IP address.
B. initiates a pinfsfg request to the URL.
C. continuously attxempts tos resolve the URL until the command is cancelled.
D. attempts to query a DNS server on the network

434、What does a router do when configured with the default DNS lookup settings, and a URL is entered on the CLI?
A. initiates a ping request to the URL
B. prompts the user to specify the desired IP address
C. continuously attempts to resolve the URL until the command is cancelled
D. sends a broadcast message in an attempt to resolve the URL

435、An engineer must provide wirelss coverage in a square office.The engineer has only one AP and belives that it should be placed it in the middle of the room.which antenna type should the engineer use ?
A. directional
B. polarized
C. Yagi
D. omnidirectional

436、

Refer to the exhibit.POSTMAN is showing an attempt to retrieve network device information from Cisco DNA Center API. what is the issue?
A. The URI string is incorrect
B. The token has expired
C. Authentication has failed
D. The JSON payload contains the incorrect UUID 

437、

Refer to the exhibit.An engineer configures a new HSRP group.while reviewing the HSRP status,the
engineer sees the logging message generated on R2.What is the cause of he message ?
A. The HSRP configuration has caused a routing loop
B. The HSRP configuration has caused a spanning-tree loop
C. A PC is on the network using the IP address 10.10.1.1

D. The same virtual IP address has been configured for two HSRP groups 

438、

Which HTTP code must be retumed to prevent the script from exiting ?
A. 200
B. 201
C. 300
D. 301 

439、what is a consideration when designing a Cisco SD-Access underlay network ?
A. The underlay switches provide endpoint physical connectivity for users
B. End user subnets and ednpoints are part of the underlay network
C. It must support IPv4 and IPv6 underlay networks
D. static routing is a requirement

440、

Refer to the exhibit.Running the script causes the output in the exhibit.what should be the first line of the script?
A. from ncclient import manager
B. import manager
C. from ncclient import *
D. ncclient manager import 

441、What happens to the signal strength of an RF signal due to wave spreading?
A. The signal strength of the RF signal will fall off equally near the transmitter and also farther away
B. The signal strength of the RF signal will fall off quickly near the transmitter but more slowly farther away
C. The signal strength of the RF signal will fall off slowly near the receiver and more quickly farther away
D. The signal strength of the RF signal will fall off slowly near the transmitter but more quickly farther away

442、Which two statements about AAA authentication are true? (Choose two)
A. RADIUS authentication queries the router’s local username database
B. TACACS+ authentication uses an RSA server to authenticate users
C. Local user names are case-insensitive
D. Local authentication is maintained on the router

E. KRB5 authentication disables user access when an incorrect password is entered

443、what is the output of this code ?

A. cisco
B. get_credentials
C. username
D. username:cisco

444、 

Refer to the exhibit.An engineer is troubleshooting a connectivity issue and ececutes a tracerout.what does the result confirm?
A. The probe times out
B. The destination server reported it is too busy
C. The protocol is unreachable
D. The destination port is unreachable 

445、where is radie resource management performed in a Cisco SD-Access wireless solution ?
A. DNA Center
B. control plane node

C. wireless controller
D. Cisco CMX

446、

Refer to the exhibit.Router1 is currently operating as the HSRP primary with a priority of 110. Router1 fails and Router2 takes over the forwarding role.which command on Router1 causes it to take over the forwarding role when it returns to service ?
A. standby 2 priority
B. standby 2 preempt
C. standby 2 track
D. standby 2 timers 

447、

Refer to the exhibit.The Etherchannel between SW2 and SW3 is not operational. which action resolves this issue ?
A. configure the mode on sw2 Gi0/0 to trunk
B. configure the mode on sw2 Gi0/1 to access
C. configure the channel-group mode on SW2 Gi0/0 and Gi0/1 to on
D. configure the channel-group mode on SW2 Gi0/0 and Gi0/1 to active 

448、''HTTP/1.1 204 No Content'' is returned when the curl -i -x DELETE command is issued.which situation has occurred ?
A. The object could not be located at the URL path
B. The command succeeded in deleting the object
C. The object was located at he URL,but it could not be deleted
D. The URL was invalid

449、what is one benefit of implementang a VSS archtecture?
A. It uses a single database to manage configuration for multiple switches
B. It provides a single point of management for improved efficiency
C. It provides multiple points of management for redundancy and improved support
D. It uses GLBP to balance traffic between gateways

450、How is MSDP used to interconnect multiple PIM-SM domains?
A. MSDP depends on BGP or multiprotocol BGP for interdomain operation
B. MSDP messages are used to advertise active sources in a domain
C. MSDP SA request messages are used to request a list of active sources for a specific group
D. MSDP allows a rendezvous point to dynamically discover active sources outside of its domain

相关文章:

CCNP350-401学习笔记(401-450题)

401、What is the function of vBond in a Cisco SDWAN deployment? A. initiating connections with SD-WAN routers automatically B. pushing of configuration toward SD-WAN routersC. onboarding of SDWAN routers into the SD-WAN overlay D. gathering telemetry dat…...

一文带你看透前端世界里的日期时间,对就是Date

很高兴我们能够通过不同空间,不同时间,通过这篇博客相识,那一定是一种缘分,一种你和狗哥的缘分。今天我希望通过这篇博客对我所熟知的前端世界里的日期时间做一个汇总,不止是代码上的汇总哦! 目录 一、时区…...

易基因|RRBS单碱基绘制580种动物的基因组规模DNA甲基化谱:Nature子刊

大家好,这里是专注表观组学十余年,领跑多组学科研服务的易基因。2023年01月16日,奥地利科学院分子医学研究中心(CeMM)研究团队在《Nat Commun》杂志发表了题为“Comparative analysis of genome-scale, base-resolution DNA methylation prof…...

面试官:能用JavaScript手写一个bind函数吗

经常会看到网上各种手写bind的教程,下面是我在自己实现手写bind的过程中遇到的问题与思考。如果对于如何实现一个手写bind还有疑惑的话,那么可以先看看上面两篇文章。 手写bind vs 原生bind 我们先使用一个典型的手写bind的例子,代码如下&a…...

美国拟发布纽扣电池或硬币电池安全标准和通知要求ANSI C18. 3M

2023年2月10日,美国向WTO提交G/TBT/N/USA/1964号通报,拟发布纽扣电池或硬币电池以及含有此类电池的消费品的安全标准和通知要求,征求意见截止日期为2023年3月13日,拟通过日期和生效日期待定。联[1]系 拟定规则通知根据H.R.5313瑞…...

双因素方差分析

一、案例与数据 一家大型商业银行在多地区设有分行,其业务主要是进行基础设施建设,国家重点项目建设,固定资产投资等项目的贷款。近年来,该银行的贷款额平稳增长,但不良贷款额也有较大比例的提高,这给银行…...

[ vulhub漏洞复现篇 ] Drupal XSS漏洞 (CVE-2019-6341)

🍬 博主介绍 👨‍🎓 博主介绍:大家好,我是 _PowerShell ,很高兴认识大家~ ✨主攻领域:【渗透领域】【数据通信】 【通讯安全】 【web安全】【面试分析】 🎉点赞➕评论➕收藏 养成习…...

「TCG 规范解读」第8章 TPM工作组 TPM 1.2中 SHA1的使用

可信计算组织(Ttrusted Computing Group,TCG)是一个非盈利的工业标准组织,它的宗旨是加强在相异计算机平台上的计算环境的安全性。TCG于2003年春成立,并采纳了由可信计算平台联盟(the Trusted Computing Platform Alli…...

熵权法计算权重

文章目录1. 多属性决策问题2. 熵(entropy)3. 信息熵4. 熵权法5. 熵权法的实现基于信息论的熵值法是根据各指标所含信息有序程度的差异性来确定指标权重的客观赋权方法,仅依赖于数据本身的离散程度。熵用于度量不确定性,指标的离散…...

redis实现用户签到,统计活跃用户,用户在线状态,用户留存率

开发的过程中,可能会遇到用户签到、统计当天的活跃用户、以及每个用户的在线状态,用户留存率的开发需求,可能会用传统的方法,根据相应的需求设计数据库表等,但这样耗费的存储空间大,以及性能方面也不会太好…...

MySQL中有多少种索引?索引的底层实现原理

索引存储在内存中,为服务器存储引擎为了快速找到记录的一种数据结构。索引的主要作用是加快数据查找速度,提高数据库的性能。索引的分类(1) 普通索引:最基本的索引,它没有任何限制。(2) 唯一索引:与普通索引类似&#…...

LeetCode经典算法题:二叉树遍历(递归遍历+迭代遍历+层序遍历)以及线索二叉树java详解

LeetCode经典算法题:二叉树遍历(递归遍历迭代遍历层序遍历)以及线索二叉树java详解 文章目录二叉树遍历题目描述解题思路与代码递归遍历迭代遍历层序遍历线索二叉树:二叉树遍历 题目描述 从根节点往下查找,先找左子树…...

【Java闭关修炼】MyBatis-接口代理的方式实现Dao层

【Java闭关修炼】MyBatis-接口代理的方式实现Dao层实现规则代码实现代理对象分析接口代理方式小结实现规则 映射配置文件中的名称空间必须和Dao层接口的全类名相同映射配置文件的增删改查标签的id属性必须和Dao层接口方法的参数相同映射配置文件中的增删改查标签的parameterTyp…...

2022年网络安全政策态势分析与2023年立法趋势

近日,公安部第三研究所网络安全法律研究中心与 360 集团法务中心联合共同发布了《全球网络安全政策法律发展年度报告(2022)》。《报告》概览2022年全球网络安全形势与政策法律态势,并对2023年及后续短期内网络安全政策、立法趋势进…...

使用vmware制作云平台redhat7.9镜像模板

一、概述 1.1 redhat7.9 定制镜像上传到云平台。 这个制作镜像得方式适用于多种iso 镜像。 将iso 镜像通过vmware 创建出一台虚机,对虚机做一些基础配置。在虚机上安装kvm 虚拟化得工具, 将iso 镜像在导入虚机种通过kvm创建一下虚机, 虚机创…...

OpenCV基础(28)使用OpenCV进行摄像机标定Python和C++

摄像头是机器人、监控、太空探索、社交媒体、工业自动化甚至娱乐业等多个领域不可或缺的一部分。 对于许多应用,必须了解相机的参数才能有效地将其用作视觉传感器。 在这篇文章中,您将了解相机校准所涉及的步骤及其意义。 我们还共享 C 和 Python 代码以…...

APB总线详解及手撕代码

本文的参考资料为官方文档AMBA™3 APB Protocol specification文档下载地址: https://pan.baidu.com/s/1Vsj4RdyCLan6jE-quAsEuw?pwdw5bi 提取码:w5bi APB端口介绍介绍总线具体握手规则之前,需要先熟悉一下APB总线端口,APB的端口…...

【Linux/Windows】源文件乱码问题解决方法总结

🐚作者简介:花神庙码农(专注于Linux、WLAN、TCP/IP、Python等技术方向)🐳博客主页:花神庙码农 ,地址:https://blog.csdn.net/qxhgd🌐系列专栏:Linux技术&…...

Python 四大主流 Web 编程框架

目前Python的网络编程框架已经多达几十个,逐个学习它们显然不现实。但这些框架在系统架构和运行环境中有很多共通之处,本文带领读者学习基于Python网络框架开发的常用知识,及目前的4种主流Python网络框架:Django、Tornado、Flask、Twisted。 …...

学UI设计,可以向哪些方向发展?该怎么学?

1、什么是UI设计?UI设计,全称 User Interface,翻译成中文意思叫做用户界面设计。2、UI设计的类型UI设计按用户和界面来分可分成四种UI设计。分别是移动端UI设计,PC端UI设计,游戏UI设计,以及其它UI设计。第一…...

深入浅出Asp.Net Core MVC应用开发系列-AspNetCore中的日志记录

ASP.NET Core 是一个跨平台的开源框架,用于在 Windows、macOS 或 Linux 上生成基于云的新式 Web 应用。 ASP.NET Core 中的日志记录 .NET 通过 ILogger API 支持高性能结构化日志记录,以帮助监视应用程序行为和诊断问题。 可以通过配置不同的记录提供程…...

java_网络服务相关_gateway_nacos_feign区别联系

1. spring-cloud-starter-gateway 作用:作为微服务架构的网关,统一入口,处理所有外部请求。 核心能力: 路由转发(基于路径、服务名等)过滤器(鉴权、限流、日志、Header 处理)支持负…...

YSYX学习记录(八)

C语言&#xff0c;练习0&#xff1a; 先创建一个文件夹&#xff0c;我用的是物理机&#xff1a; 安装build-essential 练习1&#xff1a; 我注释掉了 #include <stdio.h> 出现下面错误 在你的文本编辑器中打开ex1文件&#xff0c;随机修改或删除一部分&#xff0c;之后…...

关于iview组件中使用 table , 绑定序号分页后序号从1开始的解决方案

问题描述&#xff1a;iview使用table 中type: "index",分页之后 &#xff0c;索引还是从1开始&#xff0c;试过绑定后台返回数据的id, 这种方法可行&#xff0c;就是后台返回数据的每个页面id都不完全是按照从1开始的升序&#xff0c;因此百度了下&#xff0c;找到了…...

Qwen3-Embedding-0.6B深度解析:多语言语义检索的轻量级利器

第一章 引言&#xff1a;语义表示的新时代挑战与Qwen3的破局之路 1.1 文本嵌入的核心价值与技术演进 在人工智能领域&#xff0c;文本嵌入技术如同连接自然语言与机器理解的“神经突触”——它将人类语言转化为计算机可计算的语义向量&#xff0c;支撑着搜索引擎、推荐系统、…...

土地利用/土地覆盖遥感解译与基于CLUE模型未来变化情景预测;从基础到高级,涵盖ArcGIS数据处理、ENVI遥感解译与CLUE模型情景模拟等

&#x1f50d; 土地利用/土地覆盖数据是生态、环境和气象等诸多领域模型的关键输入参数。通过遥感影像解译技术&#xff0c;可以精准获取历史或当前任何一个区域的土地利用/土地覆盖情况。这些数据不仅能够用于评估区域生态环境的变化趋势&#xff0c;还能有效评价重大生态工程…...

API网关Kong的鉴权与限流:高并发场景下的核心实践

&#x1f525;「炎码工坊」技术弹药已装填&#xff01; 点击关注 → 解锁工业级干货【工具实测|项目避坑|源码燃烧指南】 引言 在微服务架构中&#xff0c;API网关承担着流量调度、安全防护和协议转换的核心职责。作为云原生时代的代表性网关&#xff0c;Kong凭借其插件化架构…...

FFmpeg avformat_open_input函数分析

函数内部的总体流程如下&#xff1a; avformat_open_input 精简后的代码如下&#xff1a; int avformat_open_input(AVFormatContext **ps, const char *filename,ff_const59 AVInputFormat *fmt, AVDictionary **options) {AVFormatContext *s *ps;int i, ret 0;AVDictio…...

多元隐函数 偏导公式

我们来推导隐函数 z z ( x , y ) z z(x, y) zz(x,y) 的偏导公式&#xff0c;给定一个隐函数关系&#xff1a; F ( x , y , z ( x , y ) ) 0 F(x, y, z(x, y)) 0 F(x,y,z(x,y))0 &#x1f9e0; 目标&#xff1a; 求 ∂ z ∂ x \frac{\partial z}{\partial x} ∂x∂z​、 …...

负载均衡器》》LVS、Nginx、HAproxy 区别

虚拟主机 先4&#xff0c;后7...