CCNP Enterprise Mock-up Test – 5 (Free) (25 questi

Please enter your email:

1. What is a benefit of data modeling languages like YANG?

 
 
 
 

2.

Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?

 
 
 
 

3. Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

 
 
 
 

4. What are two common sources of interference for Wi-Fi networks? (Choose two.)

 
 
 
 
 

5.

VLANs 50 and 60 exist on the trunk links between all switches. All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server.

Which command ensures that SW3 receives frames only from VLAN 50?

 
 
 
 

6.

Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?

 
 
 
 

7. A client with IP address 209.165.201.25 must access a web server on port 80 at 209.165.200.225. To allow this traffic, an engineer must add a statement to an access control list that is applied in the inbound direction on the port connecting to the web servers.

Which statement allows this traffic?

 
 
 
 

8.

Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning-tree port-priority 32 command on G0/1 on SW2, but the port remains blocked.

Which command should be entered on the ports that are connected to Link2 to resolve the issue?

 
 
 
 

9. Which statement explains why Type 1 hypervisor is considered more efficient than Type2 hypervisor?

 
 
 
 

10. Which JSON syntax is valid ?

 
 
 
 

11. Which two methods are used by an AP that is trying to discover a wireless LAN controller? (Choose two.)

 
 
 
 
 

12. Which protocol does REST API rely on to secure the communication channel?
A

 
 
 
 

13. Which PAgP mode combination prevents an EtherChannel from forming?

 
 
 
 

14. What is the JSON syntax that is formed from the data?

 
 
 
 

15. In OSPF, which LSA type is responsible for pointing to the ASBR router?

 
 
 
 

16. Which IP SLA operation requires the IP SLA responder to be configured on the remote end?

 
 
 
 

17. Which QoS component alters a packet to change the way that traffic is treated in the

 
 
 
 

18.

An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router. However, the router can still ping hosts on the 209.165.200.0/24 subnet.

Which explanation of this behavior is true?

 
 
 
 

19. When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

 
 
 
 

20. If a VRRP master router fails, which router is selected as the new master router?

 
 
 
 

21. Based on this interface configuration, what is the expected state of OSPF adjacency?

 
 
 
 

22. Which two mechanisms are available to secure NTP? (Choose two.)

 
 
 
 

23. Which behavior can be expected when the HSRP version is changed from 1 to 2?

 
 
 
 

24. R1# *Feb 14 37:09:53.129: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to up What is the logging severity level?

 
 
 
 

25.

Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?

 
 
 
 

Question 1 of 25

Dhawan Sagar

Hi all,
Good to see you here.
I'm your Trainer for CCIE, CCNP, CCNA, Firewall batches and many more courses coming up!
Stay tuned for latest updates!
Keep me posted over Whatsapp/Email about your experience learning from us.
Thanks for being part of - "Network Journey - A journey towards packet-life!!!"