Category: CCNPv8 ENCOR

15.1.5 Lab – Implement GLBP (Answers)

15.1.5 Lab – Implement GLBP (Answers) Topology Addressing Table Device Interface IP Address Default Gateway D1 VLAN 99 192.168.99.1/24 N/A VLAN 99 2001:db8:99::1/64 Loopback 0 172.16.1.1/24 Loopback 0 2001:db8:172::1/64 D2 VLAN 99 192.168.99.2/24 N/A VLAN 99 2001:db8:99::2/64 Loopback 0 172.16.1.1/24 Loopback 0 2001:db8:172::1/64 PC1 NIC 192.168.99.75/24 192.168.99.1 SLAAC …

15.1.4 Lab – Implement VRRP (Answers)

15.1.4 Lab – Implement VRRP (Answers) Topology Addressing Table Device Interface IP Address Default Gateway D1 Lo 0 192.168.1.1/24 N/A 2001:db8:acad:1000::1/64 VLAN 11 10.11.0.1/24 2001:db8:acad:11::1/64 VLAN 21 10.21.0.1/24 2001:db8:acad:21::1/64 D2 Lo 0 192.168.1.1/24 N/A 2001:db8:acad:1000::1/64 VLAN 11 10.11.0.2/24 2001:db8:acad:11::1/64 VLAN 21 10.21.0.2/24 2001:db8:acad:21::2/64 PC1 NIC 10.11.0.50/24 10.11.0.254 IPv6 …

15.1.3 Lab – Implement HSRP (Answers)

15.1.3 Lab – Implement HSRP (Answers) Topology Addressing Table Device Interface IP Address Default Gateway D1 Lo 0 192.168.1.1/24 N/A Lo 0 2001:db8:acad:1000::1/64 N/A VLAN 11 10.11.0.1/24 N/A VLAN 11 2001:db8:acad:11::1/64 N/A VLAN 21 10.21.0.1/24 N/A VLAN 21 2001:db8:acad:21::1/64 N/A D2 Lo 0 192.168.1.1/24 N/A Lo 0 2001:db8:acad:1000::1/64 …

Chapter 27: Quiz – Virtualization (Answers) CCNPv8 ENCOR

1. What is the function of a hypervisor? to create VMs and provide hardware abstraction to support them to create an isolated environment where containerized applications run to perform FCAPS functions for VNFs to centralize management of vSwitch configuration 2. What are three characteristics of containers on a …

Chapter 26: Quiz- Network Device Access Control and Infrastructure Security (Answers) CCNPv8 ENCOR

14. A network administrator configures an ACL with the command R1(config)# access-list 1 permit 172.16.0.0 0.0.15.255. Which two IP addresses will match this ACL statement? (Choose two.) 172.16.0.255 172.16.15.36 172.16.16.12 172.16.31.24 172.16.65.21 15. Which service can be disabled to help mitigate man-in-the-middle intrusion attacks that exploit spoofed MAC …

Chapter 23: Quiz – Fabric Technologies (Answers) CCNPv8 ENCOR

13. Which IGP is used in the automated underlay model of the Cisco SD-Access architecture? IS-IS OSPF EIGRP BGP 14. Which SD-Access functionality replaces manual device configuration with network device management by using Cisco DNA Center for faster, lower-risk deployment? network automation network assurance network virtualization policy enforcement …