CCIE/CCNP 350-401 ENCOR Dumps Full Questions with VCE & PDF

CCNP 350-401 Dumps Project

CCIE/CCNP 350-401 ENCOR Dumps Full Questions with VCE & PDF 1

Exam Information

CCNP ENCOR 350-401 exam consists of about 100± questions, which are required to be completed in 120 minutes. If you wish to acquire success in the same, you must have to go through lots of studying, or you could have the CCNP Dumps from a reputed and reliable provider like the ITExamAnswers.

TABLE CONTENT
Info / VCE file / Changelog Page 1
Multiple Choice Questions Group Page 2
Drag and Drop Questions Group Page 3

From the comments here and information from other places, this article tries to summarize all the CCNP ENCOR frequently asked questions and many tips that can help you save much time when sitting in the exam hall.
Please feel free to ask anything that you are unclear about CCNP ENCOR so that all of us can help you. I will update this article frequently to bring you newest information about this exam.

Practice Online Test – Download VCE and PDF Offline files
Group 1: Multiple Choice (Free) Group 2: Drag and Drop (Free)
Download VCE and PDF Practice Offline files (Paid)

Change/Update logs

  • v12.1 (20 Oct 2021): Fixed Q389, Q482.
  • v12.0 (11 Oct 2021): Added new questions Q490–>Q499, Q37(D&D). Update Q19D&D, Q115, 118, 310, 474, 478, 487
  • v11.3 (21 Sep 2021): Added new questions Q488–>491; add exhibit for Q420
  • v11.2 (12 Sep 2021): Add image 431, 476. Add new questions: Q485, 486, 487, Fix Q101, Q477
  • v11.0 (3 Sep 2021): Added new questions Q476-484; Q35-36(D&D)
  • v10.11 (1 Sep 2021): Fix 263, 448, 409, Q33(D&D), Added image: Q392, 448
  • v10.10 (22 Aug 2021): Fix Q304, 314, 345, 393, 415, 421, 423, 449, 452
  • v10.9 (18 Aug 2021): Added new questions Q474-475; Q33-34(D&D). Fix Q389, 391, 393, 442, Q26(D&D)
  • v10.8.2 (28 Jul 2021): Fix Q274, 393.
  • v10.8.1 (27 Jul 2021): Added new Q473; Add image/Explanation Q435, 386, 268, 379; Fix Q1, 23(D&D), 425, 471.
  • v10.7.6 (25 Jul 2021): Add correct answer Q94
  • v10.7.5 (24 Jul 2021): Fix Q18, 178, 207, 268, 440, 444
  • v10.7.4 (23 Jul 2021): Fix Q223, Q432, D&D:1,21,32
  • v10.7.2 (18 Jul 2021): Fix Q433; Add Explanation Q411
  • v10.7.1 (7 Jul 2021): Fix Q32 (D&D)
  • v10.7 (7 Jul 2021): Add new question: Q472; Q31–>32 (D&D); Fix Q439; Update image Q471,459,469, 449,417,395,403
  • v10.6 (27 Jun 2021): Add new question: Q467–>471 ; Q29–>30 (D&D). Update Q460, 430. Fix Q440
  • v10.5 (23 Jun 2021): Fix 321, 268, 407, 416, 445, 455, 466; Remove duplicate Q443
  • v10.4 (22 Jun 2021): Add new questions Q461–>466, Fix/Add image Q428, 407, 399, 382, 383, 432
  • v10.3 (22 Jun 2021): Fix Q430; Q436
  • v10.2 (18 Jun 2021): Add new questions Q391–>Q460; Q23–>Q28, Fix Q382
  • v9.5.2 (18 May 2021): Fix Q98, Q382, Q277, Q365, Q21D&D
  • v9.5.1 (9 May 2021): Fix Q94, Q150, Q385
  • v9.5 (7 May 2021): Add new questions Q388, Q389, Q390. Update explanation for Q376, 361, 370, 378. Fix Q292, Q17 D&D, Q383, Q250, 385, 384, 365, 375, 364
  • v9.4 (23 Apr 2021): Update explanation for Q287 Q14 (D&D). Fix answer Q353, Q277
  • v9.3 (21 Apr 2021): Add new questions Q380 –> Q387. Fix Q84.
  • v9.2 (20 Apr 2021): Fix/Add Explanation some questions Q354, 379, 377, 375, 372, 369, 368.
  • v9.0 (14 Apr 2021): Add new questions Q366 –> Q379.
  • v8.1 (7 Apr 2021): Add new questions Q361, Q362, Q363.
    Fix questions: 18, 48, 94, 155, 207, 217, 219, 233, 234, 244, 271, 274, 276, 287, 294, 324, 325, 327, 330, 331, 339, 347, 354, 358, Q9 (D&D)
  • v8.0 (1 Apr 2021 2021): Add new questions Q346 –> 360; Q22 (Drag&Drop)
  • v7.0 (18 Mar 2021): Add new questions Q337 –> 345; Corrected many questions
  • v6.0 (1 Mar 2021): Add new questions Q310 –> 336; Q16 -> 21 (Drag&Drop)
  • v5.1 (14 Feb 2021): Fix Q48,Q299, Q301, Q303, Q306, Q308, Q251, Q147, Q223, Q266; Deleted Q232
  • v5.0 (12 Feb 2021): Add new questions Q290–> Q309; Q14-15 (Drag&Drop)
  • v4.2 (17 Jan 2021): Fix Q253, Q264, Q267, Q274, Q280
  • v4.0 (15 Jan 2021): Add new questions Q263 –> Q289, Fix Q230
  • v3.1 (9 Jan 2021): Fix Q85, Q212
  • v3.0 (2 Jan 2021): Fix some questions. Add new questions: Q225->Q252, Q13 (Drag&Drop)
  • v2.0 (18 Oct 2020): Add new questions
  • v1.0 (6 Oct 2020)

Related Articles

guest
3.1K Comments
Inline Feedbacks
View all comments
gery
gery
19 hours ago

did anyone have a valid dumps for ccnp scurity 350-701 exem?

Harry
Harry
2 days ago

Please do anyone pass the exam recently

Max Blacks
Max Blacks
3 days ago

Admin, it’s possible to add the response of Q264 in the vce file?

VCE.JPG
Max Blacks
Max Blacks
3 days ago

About the VCE file, it’s missing the answrs of the Q264

Max Blacks
Max Blacks
4 days ago

Q100 – Attached the missing exhibit.

yagi_pattern.JPG
Max Blacks
Max Blacks
4 days ago

Dear Friends, the time 120 min is enough to respond to the +/- 100 questions?

Toby
Toby
6 days ago

I passed the exam. Thanks to admin and to all of you who participate in the forum. Thanks to Joa for meaningful exchanges.

I had about 3 to 5 new MCQ questions. About 6 D&D were all from this dump. Sorry, I do not remember details.

I had question from the oldest to most recent in this dump. Study ALL question, not only recent ones.

Last edited 6 days ago by Toby
alex
alex
6 days ago

I passed my Exam .
Dumps still valid. 8 new questions.

Architecture100%
Virtualization90%
Infrastructure83%
Network Assurance90%
Security85%
Automation87%

Edwin Oyieko
Edwin Oyieko
6 days ago

Did the exam today. Dumps are very valid. Got only 1 new question! Thanks admin for the good work

rdrive
rdrive
6 days ago

Q48 is wrong as the source inbound is from the host on 201 to port 80 on the server:

Answer B: permit tcp host 209.165.201.25 host 209.165.200.225 eq 80

Toomax
Toomax
8 days ago

Thanks Joa. How many questions (D&D+MCQ)? How many new questions?

Lex
Lex
9 days ago

Hello Joa,
Congratulation to your achievement and thanks for letting us know!

Joa
Joa
9 days ago

Hi mates,

I just passed my Exam. Thanks to all of you.
Toby thanks to you too. Some of your questions and some of answers verifications helped.
Dumps still valid. But there were new questions.

my score
Architecture 100%
Virtualization 100%
Infrastucture 90%
Network Assurance 100%
Security. 95%
Automation 67%

mohd
mohd
9 days ago

Hi
Q 148 says Correct Answer: C.
In explanation it says: Answer ‘OTP uses LISP encapsulation for dynamic multipoint tunneling’ is not correct. (referring to ans. C)
So which answer is correct?

lex
lex
10 days ago

QUESTION 494
What is required for intercontroller Layer 3 roaming?

A. Mobility groups are established between wireless controllers.
B. The management VLAN is present as a dynamic VLAN on the second WLC.
C. WLCs use separate DHCP servers.
D. WLCs have the same IP addresses configured on their interfaces.
Correct Answer: A and not D

Reference: CCNP and CCIE Enterprise Core 350-401 >>> Page 552
Each controller maintains a mobility list that contains its own MAC address and the MAC addresses of other controllers. Each controller in the list is also assigned a mobility group name. In effect, the mobility list gives a controller its view of the outside world; it knows of and trusts only the other controllers configured in the list. If two controllers are not listed in each other’s mobility list, they are unknown to each other and clients will not be able to roam between them. Clients will have to associate and authenticate from scratch.

lex
lex
10 days ago

QUESTION 495
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight
into cyber threats?

A. threat defense
B. security services
C. security intelligence
D. segmentation

It is not C >>> Reference:
CCNP and CCIE Enterprise Core 350-401 >>> Page 709
Threat defense: It is important to have visibility into the most dangerous cyber
threats. Threat defense provides this visibility through network traffic telemetry,
file reputation, and contextual information (such as device types, locations, users,
identities, roles, privileges levels, login status, posture status, and so on). It enables
assessment of the nature and the potential risk of suspicious activity so that the
correct next steps for cyber threats can be taken.

Last edited 10 days ago by lex
Toby
Toby
11 days ago

314. Refer to the exhibit. Which action resolves the EtherChannel issue between SW2 and SW3?

C or D ?

It was reported recently on other site that the answer options are as follow. It is obvious now what is the correct answer. Note that in the screenshot below, answers are not in the same order as on this site:

1.png
Last edited 11 days ago by Toby
Toby
Toby
12 days ago

QUESTION 490

An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command
set is required to complete this task?

interface GigabitEthernet0/1
ip address 10.10.10.2 255.255.255.0
vrrp 115 ip 10.10.10.1
vrrp 115 authentication 406630697

A.
Router(config-if)#vrrp 116 priority 100

B.
Router(config-if)#standby 115 priority 100
Router(config-if)#standby 115 prompt

C.
Router(config-if)#vrrp 116 track 1 decrement 10
Router(config-if)#vrrp 115 preempt

D.
Router(config-if)#vrrp 115 track 1 decrement 100
Router(config-if)#vrrp 115 preempt

Correct Answer: C

Why not D ?
How can we decide without knowing the priority configured on all routers ?

Toby
Toby
12 days ago

QUESTION 482
Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output.

Which interfaces are misconfigured on these routers?

A. The peer router interface is configured as Level 1 only, and the R2 interface is configured as Level 2 only

B. The R2 interface is configured as Level 1 only, and the Peer router interface is configured as Level 2 only

C. The R2 interface is configured as point-to-point, and the peer router interface is configured as multipoint.

D. The peer router interface is configured as point-as-point, and the R2 interface is configured as multipoint.

Correct Answer: C

See this link:
https://sparkysspace.wordpress.com/2010/09/14/bsci-isis-adjacency-requirements/

So the correct answer is A or B (depending of the missing exhibit)

Am I right ?

Joa
Joa
12 days ago

Hi guys,

I booked exam for this Friday. I am not sure for these questions. I saw different answers for these questions. If you can clarify for me. I will appreciated for your help. Thanks.

183. What does Call Admission Control require the client to send in order to reserve the bandwidth?

  • A. SIP flow information
  • B. Wi-Fi multimedia
  • C. traffic specification
  • D. VoIP media session awareness

Correct Answer: C or D?

223. Which two statements about AAA authentication are true? (Choose two)

  • A. RADIUS authentication queries the router’s local username database
  • B. TACACS+ authentication uses an RSA server to authenticate users
  • C. Local user names are case-insensitive
  • D. Local authentication is maintained on the router
  • E. KRB5 authentication disables user access when an incorrect password is entered

Answer: DE or CD?

308. What is a characteristic of MACsec?

  • A. 802.1AE provides encryption and authentication services
  • B. 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802 1X session
  • C. 802.1AE is bult between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)
  • D. 802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol

Correct Answer: B or A?

448. Refer to the exhibit. After running the code in the exhibit. Which step reduces the amount of data that NETCONF server returns to the NETCONF client, to only the interface’s configuration?

  • A. Use the txml library to parse the data returned by the NETCONF server for the interface’s configuration
  • B. Create an XML filter as a string and pass it to get_config() method as an argument.
  • C. Create a JSON filter as a string and pass it to the get_config() method as an argument.
  • D. Use the JSON library to parse the data returned by the NFTCONF server for the interface’s configuration.

Correct Answer: B Or D?

neo
neo
12 days ago

Thanks admin for the update :

Added new questions Q490–>Q499, Q37(D&D). Update Q19D&D, Q115, 118, 310, 474, 478, 487

olivier.zapata
olivier.zapata
13 days ago

Anyone pass the exam confirm us how may new questions

Joa
Joa
13 days ago

Questions not sure ENCOR

Hi mates,

I booked my exam for this Friday. I just have few questions that i am not sure. If you can help. I’ll be very grateful. Thanks.

183. What does Call Admission Control require the client to send in order to reserve the bandwidth?

  • A. SIP flow information
  • B. Wi-Fi multimedia
  • C. traffic specification
  • D. VoIP media session awareness

Correct Answer: C or D?

223. Which two statements about AAA authentication are true? (Choose two)

  • A. RADIUS authentication queries the router’s local username database
  • B. TACACS+ authentication uses an RSA server to authenticate users
  • C. Local user names are case-insensitive
  • D. Local authentication is maintained on the router
  • E. KRB5 authentication disables user access when an incorrect password is entered

Answer: DE or CD?

308. What is a characteristic of MACsec?

  • A. 802.1AE provides encryption and authentication services
  • B. 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802 1X session
  • C. 802.1AE is bult between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)
  • D. 802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol

Correct Answer: B or A?

314. Refer to the exhibit. Which action resolves the EtherChannel issue between SW2 and SW3?
comment image

  • A. Configure switchport mode trunk on SW2.
  • B. Configure switchport nonegotiate on SW3
  • C. Configure channel-group 1 mode desirable on both interfaces.
  • D. Configure channel-group 1 mode active on both interfaces.

Correct Answer: D or C?

345. What is the result when an active route processor fails in a design that combines NSF with SSO?

  • A. An NSF-aware device immediately updates the standby route processor RIB without churning the network
  • B. The standby route processor temporarily forwards packets until route convergence is complete
  • C. An NSF-capable device immediately updates the standby route processor RIB without churning the network
  • D. The standby route processor immediately takes control and forwards packets along known routes

Correct Answer: B or D?

448. Refer to the exhibit. After running the code in the exhibit. Which step reduces the amount of data that NETCONF server returns to the NETCONF client, to only the interface’s configuration?
comment image

  • A. Use the txml library to parse the data returned by the NETCONF server for the interface’s configuration
  • B. Create an XML filter as a string and pass it to get_config() method as an argument.
  • C. Create a JSON filter as a string and pass it to the get_config() method as an argument.
  • D. Use the JSON library to parse the data returned by the NFTCONF server for the interface’s configuration.

Correct Answer: B Or D?

Toby
Toby
13 days ago

NEW QUESTION about SD-WAN was reported elsewhere without solution.
Please come up with a solution.

What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two)

A: It provides resilient and effective traffic flow using MPLS.
B: It improves endpoint protection by integrating embedded and cloud security features.
C: It allows configuration of application-aware policies with real time enforcement.
D: It simplifies endpoint provisioning through standalone router management
E: It enforces a single. scalable. hub-and-spoke topology.  

Last edited 13 days ago by Toby
Toby
Toby
13 days ago

Q498

Why answer B (year/month/day) and not C (yyyymmdd) ?

I see no “/” (slash) in the Python code.

Last edited 13 days ago by Toby
Toby
Toby
14 days ago

NEW QUESTION, please come up with suggestions guys:

Which technology uses network traffic telemetry, contextual information, and file repudiation to provide insight into cyber threats?

A: security services
B: threat defence
C: security intelligence
D: segmentation

Toby
Toby
15 days ago

DD33 , D&D33 , QUESTION 33

Drag and drop the snippets onto the blanks within the code to construct a script that configures BGP according to the topology. Not all options are used, and some options may be used twice.

I have labed this question and followed Kevin Wallace video on YouTube: https://www.youtube.com/watch?v=BvPRkAQOrD8

The question does not say what router is being configured, I assume that it is client router.

I have configured BGP on Cisco always on router sandbox-iosxe-recomm-1.cisco.com and then read the configuration with NetConf script as shown by Kevin.

Here is my result:

<router>
<bgp xmlns=”http://cisco.com/ns/yang/Cisco-IOS-XE-bgp”>
<id>65001</id>
<bgp>
<log-neighbor-changes>true</log-neighbor-changes>
</bgp>
<neighbor>
<id>192.168.1.1</id>
<remote-as>65000</remote-as>
</neighbor>
<address-family>
<no-vrf>
<ipv4>
<af-name>unicast</af-name>
<ipv4-unicast>
<neighbor>
<id>192.168.1.1</id>
<activate/>
<soft-reconfiguration>inbound</soft-reconfiguration>
</neighbor>
</ipv4-unicast>
</ipv4>
</no-vrf>
</address-family>
</bgp>
</router>

Correct answer is then:

65001
192.168.1.1
65000
192.168.1.1

Also, 192.168.1.1 must be listed twice in answer options.

Toby
Toby
16 days ago

DD19, QUESTION 19

Question 19 is wrong. Two characteristics are for EIGRP, but there is only one field under it. EIGRP uses DUAL algorithm and maintains backup path (feasible successor) if available.

Admin, To make this question correct can you swap words OSPF with EIGRP in orange boxes?

Joa
Joa
16 days ago

Hi mates,
can anybody help me understand this question? I am confused. Thanks in advance

183. What does Call Admission Control require the client to send in order to reserve the bandwidth?

  • A. SIP flow information
  • B. Wi-Fi multimedia
  • C. traffic specification
  • D. VoIP media session awareness

Correct Answer: C or D?

Joa
Joa
17 days ago

115. A company plans to implement intent-based networking in its campus infrastructure. Which design facilities a migrate from a traditional campus design to a programmer fabric designer?

  • A. Layer 2 access
  • B. three-tier
  • C. two-tier
  • D. routed access

Correct Answer: C

It should be D.
 it says campus, not data center which have different design guidelines:

Campus: routed
Data Center: 2 tier (Spine and Leaf)

Please see below on Page 36
https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2017/pdf/BRKCRS-2812.pdf

Toby
Toby
18 days ago

Q223
Which two statements about AAA authentication are true? (Choose two)

Correct answer should be CD (Not DE). This was already confirmed in previous posts.

LUKAS
LUKAS
18 days ago

Q472 and Q490 are duplicated
Q145 and Q491 are duplicated

LUKAS
LUKAS
18 days ago

487. An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?

A. username netadmin secret 5 $1$b1JUSkZbBS1Pyh4OzwXyZ1kSZ2
B. username netadmin secret $15b1JuSk404850110QzwXyZ1k SZ2
C. line Console 0
password $15b1Ju$
D. username netadmin secret 9 $9$vFpMfBelbRVV8SseX/bDAxtuV

Scrypt is safer than MD5, so answer A is wrong and answer D is correct

R1(config)#username user secret ?
 0     Specifies an UNENCRYPTED secret will follow
 5     Specifies a MD5 HASHED secret will follow
 8     Specifies a PBKDF2 HASHED secret will follow
 9     Specifies a SCRYPT HASHED secret will follow
 <0-9> Encryption types not explicitly specified
 LINE  The UNENCRYPTED (cleartext) user secret
 LINE  The UNENCRYPTED (cleartext) user secret

Toby
Toby
18 days ago

Q220:
Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

Correct answer is A, but the explanation says:
“Missing Data Model RPC Error Reply Message”

Where do you see “Missing data” error message?
How do we know it is about Catalyst 3850 ?
Is the exhibit correct and related to this question ?

Last edited 18 days ago by Toby
olivier.zapata
olivier.zapata
18 days ago

Hi everyone! can someone confirm that this dump is up to date please?

daniel.brazil
daniel.brazil
23 days ago

Hi All, Thanks for this site, I passed today on my exam.. 100% valid this dump.

Last edited 23 days ago by daniel.brazil
John
John
24 days ago

Hi all! Thanks to site admin and because I’ve passed yesterday and this material is 100% valid. Thank you and good luck!

rushing
rushing
24 days ago

holy sheet! i passed yesterday. this dump is very valid, only about 4 new questions. i have benn recertified ccnp switching & routing for several times. now that cisco retires ccnp certification :(

there is such a big gap between ccnp & encor. tried as i might, i don’t have the time to digest all the study guide. this is my saviour 

Thank You !

daniel.brazil
daniel.brazil
25 days ago

My exam will be next Friday (Oct/1st/2021), still valid? I am trusting on this dump.. Any additional recommendation to be shared? tks 

Last edited 25 days ago by daniel.brazil
running_cert
running_cert
27 days ago

Hi all! Thanks to site admin and every discussion contributors, cause I’ve passed today and this material is 100% valid. It is highly recommended to read carefully the explanations for each question, if available, click and study the reference links and at last but not least try to review harder/tricky questions, perhaps presenting your doubts within this forum to discuss with mates. That is tips to you folks. Good lucky everyone!

Toby
Toby
28 days ago

Q482

Anyone has the debugging output for this question?
Correct answer must C or D but we need debug to find out which one.

Joa
Joa
28 days ago

Hi mates,

62. Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?

  • A. ETR
  • B. MR
  • C. ITR
  • D. MS

Correct Answer: A
Explanation:
An Egress Tunnel Router (ETR) connects a site to the LISP-capable part of a core network (such as the Internet), publishes EID-to-RLOC mappings for the site, responds to Map-Request messages, and decapsulates and delivers LISP-encapsulated user data to end systems at the site.
Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/locator-id-separation-protocol-lisp/white_paper_c11-652502.html

Verifying the answer above. I couldn’t find where it is mentioned ETR in reference above,
But I find that the answer could be B and not A
–Map-Resolver (MR): an MR is a LISP Infrastructure device to which LISP site ITRs send LISP Map-Request queries when resolving EID-to-RLOC mappings.

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DCI/5-0/LISPmobility/DCI_LISP_Host_Mobility/LISPmobile_2.htm

Please someone correct me if I am wrong!

Cert Taker 202
Cert Taker 202
28 days ago

Q483. Does anyone have documentation regarding if answer B is correct? I have found not a single reference that Data MDT are created from (*,G).

Instead I have found a Cisco article that implies that correct answer is D: https://www.cisco.com/c/en/us/support/docs/ip/multicast/212974-next-generation-multicast-default-mdt.html#anc2

Data MDTs are created only for (S, G) multicast route entries within the VRF multicast routing table. They are not created for (*, G) entries regardless of the value of the individual source data rate

Last edited 28 days ago by Cert Taker 202
asdf
asdf
28 days ago

PLEASE VERIFY THE ANSWER ON 483 and 484
483. What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?

  • A. The traffic uses the default MDT to transmit the data only if it isa (S,G) multicast route entry

 
Data MDT—Data MDTs are optional. If enabled, they are dynamically created to provide optimal paths for high-bandwidth transmissions, such as full-motion video, that do not need to be sent to every PE router. This allows for on-demand forwarding of high-bandwidth traffic between PE routers, so as to avoid flooding every PE router with every high-bandwidth stream that might be created.
To create data MDTs, each PE router that is forwarding multicast streams to the backbone periodically examines the traffic being sent in each default MDT as follows:
1. Each PE router periodically samples the multicast traffic (approximately every 10 seconds for software switching, and 90 seconds for hardware switching) to determine whether a multicast stream has exceeded the configured threshold. (Depending on when the stream is sampled, this means that in a worst-case scenario, it could take up to 180 seconds before a high-bandwidth stream is detected.)
file:///C:/Users/ivfermin/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif
 
Note Data MDTs are created only for (S, G) multicast route entries within the VRF multicast routing table. They are not created for (*, G) entries.
 
From <https://www.cisco.com/en/US/docs/general/Test/dwerblo/broken_guide/mvpn.html&gt;
 
 
484. AN engineer is implementing MPLS OAM to monitor traffic within the MPLS domain. Which action must the engineer perform to prevent from being forwarded beyond the service provider domain when the LSP is down?

  • B. Implement the destination address for the LSP echo request packet in the 127.x.y.z/8 network

 
IP address of the MPLS echo request packet is different from the address used to select the label stack. The destination IP address is defined as a 127.x.y.z/8 address and it prevents the IP packet from being IP switched to its destination, if the LSP is broken.
 
Reference
https://www.cisco.com/c/en/us/td/docs/iosxr/ncs5000/mpls/66x/b-mpls-cg-ncs5000-66x/m-implementing-mpls-oam.pdf

Toby
Toby
29 days ago

DD33
QUESTION 33
Drag and drop the snippets onto the blanks within the code to construct a script that configures BGP according to the topology. Not all options are used, and some options may be used twice.

Can anyone confirm the answer, especially the first entry “ISP”. They are asking for BGP ID so by no means it can be “ISP”, it must be a 32 bit number, but which one ?

Any ideas ?

Luigi Aversa
Luigi Aversa
29 days ago

Hello everyone, the exam is valid !!!

running_cert
running_cert
1 month ago

Hi, regarding Q.264 I think option D is the right answer and maybe this is a good reference: https://networklessons.com/cisco/ccie-routing-switching/how-to-configure-gre-tunnel-on-cisco-ios-router

Joa
Joa
1 month ago

Hi mates,
Anybody have the exhibit of this question? thanks

478. Refer to the exhibit. Router BRDR-1 is configured to receive the 0.0.0.0/0 and 172.17.1.0/24 network via BGP and advertise them into OSPF are 0. An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and default route 0.0.0.0/0 is still missing. Which configurating must engineer apply to resolve the problem?

LUKAS
LUKAS
1 month ago

following hatem’s comment 4 months old comment.
CORRECT ANSWER IS “D”

268. Refer to the exhibit. Which password allows access to line con 0 for a username of “tommy” under normal operation?comment image

  • A. Cisco
  • B. local
  • C. 0 Cisco
  • D. Tommy

i think correct answer is D because in configuration line he use aaa authentication login local tacacs ( local here is the name of authentication list and not the local database ) , other check is on line vty he use login authentication local (local here is the name of authentication where we created before )

EVIDENCE:
local here is not authentication method, but authentication list name.

R2(config)#aaa authentication login ?
 WORD    Named authentication list (max 31 characters, longer will be
          rejected).
 default The default authentication list.

R2(config-line)#login authentication ?
 WORD    Use an authentication list with this name.
 default Use the default authentication list.

Joa
Joa
1 month ago

Hi mates,
can someone clarify this? please.

183. What does Call Admission Control require the client to send in order to reserve the bandwidth?

  • A. SIP flow information
  • B. Wi-Fi multimedia
  • C. traffic specification
  • D. VoIP media session awareness

Correct Answer: C

But I think it could D the correct answer!

Call admission control operates by rejecting a call for bandwidth and policy reasons. When a call is rejected due to call admission control, the phone of the called party does not ring, and the caller receives a busy tone. The caller also receives a message on their phone, such as “Not enough bandwidth.” If you have enabled automated alternate routing (AAR), call admission control automatically diverts calls to alternate public switched telephone network (PSTN) routes when WAN bandwidth is not available

Call Admission Control (CAC) is a concept that applies to voice traffic only—not data traffic. If an influx of data traffic oversubscribes a particular link in the network, queueing, buffering, and packet drop decisions resolve the congestion. The extra traffic is simply delayed until the interface becomes available to send the traffic, or, if traffic is dropped, the protocol or the end user initiates a timeout and requests a retransmission of the information.