Cover: CCNP® Enterprise Certification Study Guide by Ben Piper

CCNP®
Enterprise Certification Study Guide

Wiley Logo

Ben Piper


Wiley Logo






I dedicate this book to the Lord Jesus Christ through Whom all things were created and in Whom all things hold together

Acknowledgments

I’d like to thank the following people who helped create this CCNP Enterprise Certification Study Guide: Exam 350-401. A special thanks to Kenyon Brown, senior acquisitions editor, for the opportunity to write this book. Thanks to John Sleeva, project editor, for pushing me to meet my deadlines. His suggestions and edits helped make this book more user friendly. Thanks also go to Christine O’Connor, production editor; Pete Gaughan, content enablement manager; and Louise Watson at Word One, proofreader. Jon Buhagiar reviewed the chapters and questions for technical accuracy. His comments guided by his expertise helped make this book more practical, accurate, and well rounded.

About the Author

Ben Piper is a networking and cloud consultant who has authored multiple books including the AWS Certified Solutions Architect Study Guide: Associate SAA-C01 Exam, Second Edition (Sybex, 2019), AWS Certified Cloud Practitioner Study Guide: Foundational CLF-C01 Exam (Sybex, 2019), and Learn Cisco Network Administration in a Month of Lunches (Manning, 2017). You can contact Ben by visiting his website https://benpiper.com.

Introduction

Networking is uniquely challenging in that it's not a single technology, but a collection of interdependent technologies that every other aspect of IT depends on. Without networking, there are no connected applications and that means there are no IT employees. Even if you're not sure that you want networking to become your permanent career, becoming an expert at networking will open the doors for other in-demand areas of IT, including security, software development, and cloud computing.

Cisco's Professional Network Certifications

In 2019, Cisco announced updates to its Cisco Certified Network Professional (CCNP) certification program. There are six professional level certifications to choose from:

  • CCNP Enterprise
  • CCNP Data Center
  • CCNP Security
  • CCNP Service Provider
  • CCNP Collaboration
  • Cisco Certified DevNet Professional

Each certification requires passing one core exam and one concentration exam. The core exam for the CCNP Enterprise certification is 350-401 ENCOR, “Implementing Cisco Enterprise Network Core Technologies.” The concentration exams let you focus on a specific specialty, such as routing, wireless, network design, automation, or software-defined networking (SDN). Regardless of the concentration exam you choose, you must pass the ENCOR exam to attain your CCNP Enterprise certification.

Is CCNP Certification Right for You?

Many who attain the Cisco Certified Network Associate (CCNA) don't go on to pursue more advanced Cisco certifications. So why should you consider the CCNP Enterprise certification, and is it right for you? It may be right for you if

  • You have a passion for networking.
  • You want to set yourself apart as someone who has a passion for technology and isn't just in it for the money (although there is plenty of that!).
  • You want to specialize in security, wireless, network automation, cloud, or software-defined networking.
  • You enjoy tweaking the “nerd knobs” on individual technologies just to see what will happen.
  • You love facing and overcoming the challenges of troubleshooting.

Study Tips

Before taking the CCNP ENCOR exam, there are a few things to keep in mind. There's no reason that you can't pass the exam the first time. To help you do that, I want to share with you some study tips that have helped me pass several Cisco certification exams on the first try. One of the neglected skills required on any Cisco exam is speed. Being able to troubleshoot a 10-router Open Shortest Path First (OSPF) topology is good. Taking 15 minutes to do it is not so good. I can't stress enough the importance of spending quality time with the command-line interface (CLI). You should spend at least 50 percent of your study time on configuring and troubleshooting a variety of topologies and technologies.

There's an old Latin proverb that repetition is the mother of learning. Repetition—in terms of both study and practice—is going to be your best friend. Understanding networking requires making connections that aren't always obvious, and the more you practice and study, the more opportunities your mind has to make those connections. For years I've used SuperMemo (https://super-memory.com), a flashcard-like program that lets you create your own question-and-answer pairs, quizzes you, and shows you how well you're retaining the information. What makes SuperMemo superior to flashcards is that it identifies the information you've already retained, and it doesn't waste time continuing to quiz you on it. That means you can safely load your collection with hundreds of items while still using your time efficiently.

One last tip: As you read this study guide cover to cover, keep a running list of questions and things you're not sure about. Chances are if you find something confusing, a lot of other people did too, and that makes it good fodder for the exam. Be sure to visit https://benpiper.com/encor for book resources, updates, and errata.

Prerequisites and Lab Requirements

The CCNA certification isn't required to attain the CCNP Enterprise certification. Nevertheless, I strongly recommend that you obtain your CCNA certification or the equivalent experience before embarking on your CCNP Enterprise journey. Refer to the CCNA exam blueprint (www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna.html) for a full list of topics you should already be familiar with. Because the CCNP Enterprise is a professional-level certification, I don't review some of the basics covered by the CCNA such as subnetting, IPv4, and IPv6 addressing.

You'll need a virtual or physical lab, which you should already have from your previous networking studies. Your lab should be able to support at least eight routers and two layer 3 switches running IOS version 15.2 or later. You should be able to configure your lab on your own by looking at layer 2 and layer 3 diagrams. Topology diagrams will be included in each chapter.

If your existing lab doesn't meet the requirement, Cisco Virtual Internet Routing Lab (http://virl.cisco.com) includes virtual machine images for a variety of switches and routers. These images are virtual machines that run using QEMU and are light on CPU and memory, so you don't need a beast of a server to run simulations, although more resources always help. Other options, although not blessed by Cisco, are GNS3 (https://gns3.com) and EVE-NG (www.eve-ng.net).

How to Use This Book

Hands-on experience is crucial for exam success. Each chapter in this study guide contains hands-on exercises that you should strive to complete during or immediately after your reading of the chapter. The exercises are there to test your understanding, and not to cover every possible permutation of configurations. The exercises are your foundation, and you should build on them by experimenting with them, breaking things, and then figuring out how to fix them.

Each chapter contains review questions to thoroughly test your understanding of the services and concepts covered in that chapter. They also test your ability to integrate the concepts with information from preceding chapters. I've designed the questions to help you realistically gauge your understanding and identify your blind spots. Once you complete the assessment in each chapter, referring to the answer key will give you not only the correct answers but a detailed explanation as to why they're correct. Even if you feel comfortable on a certain topic, resist the urge to skip over the pertinent chapter. I strongly encourage you to carefully read this book from cover to cover so that you can discover your strengths and weaknesses—particularly the ones you may not be aware of. Remember, even though you can't learn networking just by reading a book, it's equally true that you can't learn without reading a book.

The book also contains a self-assessment exam with 36 questions, two practice exams with 50 questions each to help you gauge your readiness to take the exam, and flashcards to help you learn and retain key facts needed to prepare for the exam.

What Does This Book Cover?

This book covers topics you need to know to prepare for the CCNP ENCOR exam:

Chapter 1: Networking Fundamentals  This chapter overviews the fundamentals of networking theory and network design.

Chapter 2: Spanning Tree Protocols  This chapter covers Spanning Tree protocols, including Rapid Spanning Tree and Multiple Instance Spanning Tree. We also cover VLANs, trunking, and pruning.

Chapter 3: Enterprise Network Design  In this chapter, you'll learn the advantages and disadvantages of different physical and layer 2 network designs. We also dive into EtherChannels and first-hop redundancy protocols.

Chapter 4: Wireless LAN (WLAN)  This chapter explains the fundamentals of radio frequency, WLAN 802.11 standards, wireless security, and WLAN controller (WLC) design and deployment considerations.

Chapter 5: Open Shortest Path First (OSPF)  In this chapter, you'll learn how to configure and troubleshoot OSPF adjacencies, authentication, route filtering, summarization, and more.

Chapter 6: Enhanced Interior Gateway Routing Protocol (EIGRP)  This chapter covers advanced EIGRP concepts, including redistribution, multipathing, and path control.

Chapter 7: The Border Gateway Protocol (BGP)  In this chapter, you'll learn all about BGP, including path selection, redistribution, summarization, and filtering.

Chapter 8: Network Address Translation and Multicast  This two-for-the-price-of-one chapter gives you complete coverage of network address translation and multicast.

Chapter 9: Quality of Service  This chapter covers QoS concepts, including queuing, policing, shaping, and classification.

Chapter 10: Network Virtualization  This chapter dives deep into virtualization concepts such as server virtualization, network virtualization, generic routing encapsulation, IPsec, LISP, and VXLAN.

Chapter 11: Software-Defined Networking and Network Programmability  In this chapter, you'll learn about Cisco's software-defined networking (SDN) solutions, SD-Access, Cisco DNA Center, and SD-WAN. You'll also learn about network automation tools such as Python, RESTCONF, NETCONF, Ansible, Chef, Puppet, and SaltStack.

Chapter 12: Network Security and Monitoring  This chapter will show you how to implement infrastructure security best practices and wireless security configurations. You'll also learn about Cisco security products and how to monitor your network using NetFlow, IPSLA, debugs, Syslog, SNMP, and more.

Interactive Online Learning Environment and Test Bank

The interactive online learning environment that accompanies this CCNP Enterprise Certification Study Guide: Exam 350-401 provides a test bank with study tools to help you prepare for the certification exam—and increase your chances of passing it the first time! The test bank includes the following:

Sample Tests  All the questions in this book are provided, including the assessment test at the end of this introduction and the chapter tests that include the review questions at the end of each chapter. In addition, there are two practice exams with 50 questions each. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.

Flashcards  The online text banks include 100 flashcards specifically written to hit you hard, so don't get discouraged if you don't ace your way through them at first. They're there to ensure that you're really ready for the exam. And no worries—armed with the review questions, practice exams, and flashcards, you'll be more than prepared when exam day comes. Questions are provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.

Other Study Tools  A glossary of key terms from this book is available as a fully searchable PDF.

images Go to www.wiley.com/go/sybextestprep to register and gain access to this interactive online learning environment and test bank with study tools.

Exam Objectives

The CCNP ENCOR exam is intended for people who have experience implementing enterprise network technologies including IPv4 and IPv6 architecture, virtualization, monitoring, security, and automation. In general, you should have the following before taking the exam:

The exam covers six different domains, with each domain broken down into objectives.

Objective Map

The following table lists each domain and its weighting in the exam, along with the chapters in the book where that domain's objectives are covered.

Domain Percentage of exam Chapter
Domain 1: Architecture 15%
1.1 Explain the different design principles used in an enterprise network 1, 3
1.2 Analyze design principles of a WLAN deployment 4
1.3 Differentiate between on-premises and cloud infrastructure deployments 11
1.4 Explain the working principles of the Cisco SD-WAN solution 11
1.5 Explain the working principles of the Cisco SD-Access solution 11
1.6 Describe concepts of wired and wireless QoS 9
1.7 Differentiate hardware and software switching mechanisms 1
Domain 2: Virtualization 10%
2.1 Describe device virtualization technologies 10
2.2 Configure and verify data path virtualization technologies 10
2.3 Describe network virtualization concepts 10
Domain 3: Infrastructure 30%
3.1 Layer 2 1, 2, 3
3.2 Layer 3 1, 5, 6, 7
3.3 Wireless 4
3.4 IP Services 3, 8, 12
Domain 4: Network Assurance 10%
4.1 Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog 12
4.2 Configure and verify device monitoring using syslog for remote logging 12
4.3 Configure and verify NetFlow and Flexible NetFlow 12
4.4 Configure and verify SPAN/RSPAN/ERSPAN 12
4.5 Configure and verify IPSLA 12
4.6 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management 11
4.7 Configure and verify NETCONF and RESTCONF 11
Domain 5: Security 20%
5.1 Configure and verify device access control 12
5.2 Configure and verify infrastructure security features 12
5.3 Describe REST API security 11
5.4 Configure and verify wireless security features 4, 12
5.5 Describe the components of network security design 4, 12
Domain 6: Automation 15%
6.1 Interpret basic Python components and scripts 11
6.2 Construct valid JSON encoded file 11
6.3 Describe the high-level principles and benefits of a data modeling language, such as YANG 11
6.4 Describe APIs for Cisco DNA Center and vManage 11
6.5 Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF 11
6.6 Construct EEM applet to automate configuration, troubleshooting, or data collection 11
6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack 11

Assessment Test

  1. IP depends on which of the following?

    1. Address Resolution Protocol
    2. Data link layer
    3. Network layer
    4. Transport layer
  2. Which is not a function of a bridge?

    1. Simulating some properties of a shared physical Ethernet cable
    2. MAC-based routing
    3. Reducing the size of a broadcast domain
    4. Frame check sequence validation
  3. What are the purposes of TCP sequence numbers? (Choose two.)

    1. Error control
    2. Ordering
    3. Flow control
    4. Reliable delivery
  4. Three switches are connected via 802.1Q trunk links. You need to prevent VLAN 25 traffic from reaching two of the switches. Which of the following can accomplish this? (Choose two.)

    1. Prune VLAN 25 on the trunk links.
    2. Use routed interfaces instead of trunks.
    3. Configure Spanning Tree to block the ports to the switches.
    4. Delete VLAN 25 on the switches.
  5. Switch SW1 is running RPVST+ and is connected via a routed interface to SW2, which is running Multiple Spanning Tree. If you add VLAN 2 to both switches and map VLAN 2 to MST1 on SW2, which switch will necessarily be the root for VLAN 2?

    1. SW1
    2. SW2
    3. The switch with the lowest bridge priority
    4. Both SW1 and SW2
  6. Which of the following can effectively prune a VLAN from a trunk?

    1. BPDU Guard
    2. BPDU Filter
    3. Loop Guard
    4. UDLD
  7. Which of the following is the most scalable physical architecture for East-West traffic patterns?

    1. Two-tier collapsed core
    2. Leaf-and-spine architecture
    3. Routed
    4. Three-tier
  8. What are two reasons to choose a routed topology over a switched topology?

    1. Better scalability
    2. Better use of IP address space
    3. The ability to stretch subnets
    4. Faster convergence
  9. Which protocol does not use multicast?

    1. LACP
    2. EtherChannel
    3. VRRP
    4. HSRP
  10. An access point running in lightweight mode has clients connected to two SSIDs. The total number of connected clients is 25. How many CAPWAP tunnels are there between the AP and its WLAN controller (WLC)?

    1. 1
    2. 2
    3. 25
    4. Lightweight mode doesn't use a WLC.
  11. A client performs an intra-controller roam, keeping its IP address. Which of the following is true of this roam?

    1. The SSID changes.
    2. The VLAN changes.
    3. It's a layer 2 roam.
    4. It's a layer 3 roam.
  12. What are two disadvantages of 5 GHz Wi-Fi versus 2.4 GHz Wi-Fi?

    1. Incompatibility with 802.11g
    2. Incompatibility with 802.11n
    3. Increased free space path loss
    4. Lower throughput
  13. There are three OSPF routers connected to the same subnet. Which is the designated router?

    1. The one with the lowest router ID
    2. The first one that became active
    3. The one with the highest router ID
    4. The one with the highest priority
  14. Two OSPF routers are connected to each other. One router's interface is configured as a broadcast network type, whereas the other router's interface is configured as a point-to-point network type. Which of the following is true of this configuration? (Choose two.)

    1. They won't form an adjacency.
    2. They will form an adjacency.
    3. They won't exchange routes.
    4. They will exchange routes.
  15. You have a router with an interface that's connected to a subnet dedicated to servers. You want to advertise this subnet into OSPF but don't want any servers running OSPF software to form an adjacency with the router. How can you accomplish this?

    1. Configure null authentication.
    2. Use a distribute list.
    3. Advertise a default route.
    4. Configure the interface as a passive interface.
  16. An OSPF autonomous system boundary router (ASBR) is redistributing the prefix 192.168.0.0/16 into EIGRP AS 1. What is the administrative distance of the route?

    1. 20
    2. 110
    3. 170
    4. 200
  17. Which of the following are considered in calculating an EIGRP metric? (Choose all that apply.)

    1. Bandwidth
    2. Delay
    3. MTU
    4. Reliability
    5. Latency
    6. Weight
  18. Consider the following EIGRP output.

    • P 10.0.36.0/29, 1 successors, FD is 3328
    • via 10.0.45.4 (3328/3072), GigabitEthernet0/3.
    • via 10.0.56.6 (5632/2816), GigabitEthernet0/0.
    • Which of the following is the feasible successor?
    1. 10.0.36.1
    2. 10.0.56.6
    3. 10.0.45.4
    4. 10.0.36.2
  19. What occurs when an eBGP router receives a route that already has its own AS number in the path?

    1. Removes the AS and advertises the route
    2. Advertises the route as is
    3. Discards the route
    4. Installs the route in its BGP RIB
    5. Discards all routes from the router it received the route from
  20. R1 has the prefix 172.16.0.0/16 in its IP routing table, learned from EIGRP AS 16. There are no other BGP, IGP, or static routes in the routing table. You execute the following BGP router configuration commands on R1:

    • network 172.16.0.0 mask 255.255.255.0
    • redistribute eigrp 16
    • Which of the following will be true regarding the route R1 advertises for the 172.16.0.0/16 prefix?
    1. 172.16.0.0/16 will have an incomplete origin type.
    2. 172.16.0.0/24 will have an incomplete origin type.
    3. R1 will not advertise the 172.16.0.0/16 prefix.
    4. 172.16.0.0/16 will have an IGP origin type.
  21. Consider the following prefix list and route map on router R1:

    • ip prefix-list all-private: 3 entries
    • seq 5 permit 10.0.0.0/8 le 32
    • seq 10 deny 0.0.0.0/0 le 32
    • route-map allow-public, deny, sequence 10
    • Match clauses:
    • ip address prefix-lists: all-private
    • Set clauses:
    • Policy routing matches: 0 packets, 0 bytes
    • route-map R4, permit, sequence 20
    • Match clauses:
    • Set clauses:
    • Policy routing matches: 0 packets, 0 bytes
    • Which prefix will this route map allow?
    1. 10.255.255.0/24
    2. 10.0.0.0/32
    3. 10.0.0.0/8
    4. 0.0.0.0/0
  22. Consider the following output from a NAT router:

    • R2#debug ip nat
    • IP NAT debugging is on
    • R2#
    • NAT*: s=7.0.0.12->2.0.0.2, d=10.0.12.1 [155]
    • Which of the following is the inside global address?
    1. 2.0.0.2
    2. 10.0.12.1
    3. 7.0.0.12
    4. 10.0.12.155
  23. A router running PIM has a single multicast RIB entry marked (223.3.2.1, 239.8.7.6). What does this indicate?

    1. The router has received an IGMP Membership Report from 223.3.2.1.
    2. 239.8.7.6 has sent unicast traffic to 223.3.2.1.
    3. 223.3.2.1 has sent multicast traffic to 239.8.7.6.
    4. The router has received a PIM Join/Graft from 223.3.2.1.
  24. Which of the following commands individually configures port address translation?

    1. ip nat inside source list 1 pool natpool
    2. ip nat inside destination list 1 pool natpool overload
    3. ip nat outside source list 1 pool natpool overload
    4. ip nat inside source list 1 interface gi0/2 overload
  25. Which QoS Class Selector has the lowest priority?

    1. CS0
    2. CS1
    3. CS7
    4. EF
  26. Which of the following prevent TCP global synchronization? (Choose two.)

    1. Explicit congestion notification
    2. Policing
    3. Weighted random early detection
    4. Fair queuing
  27. Which of the following queues can never exceed its bandwidth allocation during times of congestion?

    1. Low-latency queue
    2. Class-based weighted fair queue
    3. Policing queue
    4. Priority queue
  28. What is another term for reflective relay?

    1. Virtual network function
    2. Virtual Ethernet bridge
    3. Virtual switching
    4. External edge virtual bridging
  29. Which of the following might you need to allow in order to use IPsec in transport mode? (Choose two.)

    1. TCP port 50
    2. IP protocol 50
    3. UDP port 500
    4. IP protocol 51
    5. IP protocol 41
  30. By default, what does VXLAN use for MAC address learning? (Choose two.)

    1. Multicast
    2. EVPN
    3. Data plane learning
    4. Control plane learning
  31. What type of encapsulation does SD-Access use?

    1. LISP
    2. IPsec
    3. VXLAN
    4. GRE
  32. Which of the following is not a component of SD-WAN?

    1. DTLS
    2. BGP
    3. OMP
    4. IPsec
  33. Which of the following HTTP response codes indicates successful authentication using a GET or PUT request?

    1. 200
    2. 201
    3. 204
    4. 401
    5. 500
  34. You want to control which commands administrators can run on a router. Which of the following should you configure?

    1. TACACS+ authorization
    2. RADIUS authorization
    3. Local authentication
    4. TACACS+ accounting
  35. Which of the following can authenticate only a machine but not a user?

    1. PEAP
    2. 802.1X
    3. MAC authentication bypass
    4. WebAuth
  36. Which of the following can't be used to block ARP packets or Spanning Tree BPDUs? (Choose two.)

    1. Port ACL
    2. VLAN access map
    3. MAC ACL
    4. Extended IP ACL

Answers to Assessment Test

  1. B. The Data Link layer facilitates data transfer between two nodes. IP addresses are logical addresses based on an abstraction of the Data Link layer. See Chapter 1 for more information.

  2. C. A bridge maintains a Media Access Control (MAC) address table that it uses to perform a crude form of routing. This reduces the need for flooding but doesn't reduce the size of the broadcast domain. Bridges forward received frames, thus simulating some of the properties of a shared physical Ethernet cable. Bridges discard frames that fail frame check sequence validation. See Chapter 1 for more information.

  3. B, D. Transmission Control Protocol (TCP) uses sequence numbers for ordering and ensuring reliable delivery by detecting lost packets. See Chapter 1 for more information.

  4. A, B. You can block VLAN 25 from reaching the switches in two ways. First, you can prune the virtual LAN (VLAN) from the trunk. Second, instead of running a trunk between switches, you can use routed links. See Chapter 2 for more information.

  5. D. Because SW1 and SW2 are connected via routed interfaces, they are in separate broadcast domains and hence form separate Spanning Trees. See Chapter 2 for more information.

  6. C. Loop Guard will block a VLAN on a port if it doesn't receive Bridge Protocol Data Units (BPDUs) for that VLAN. Unidirectional Link Detection (UDLD) and BPDU Guard can shut down an entire port. BPDU Filter doesn't block traffic. See Chapter 2 for more information.

  7. B. Leaf-and-spine architecture is the most scalable choice for networks with predominantly East-West traffic patterns such as data center networks. Routed is not a physical architecture, but rather a layer 2 architecture. See Chapter 3 for more information.

  8. A, D. Routed topologies scale better and converge faster than switched topologies, but they require consuming more IP address space. See Chapter 3 for more information.

  9. B. EtherChannel doesn't use multicast. Link Aggregation Control Protocol (LACP), which negotiates EtherChannels, and Virtual Router Redundancy Protocol (VRRP) and Hot Standby Router Protocol (HSRP), which are first-hop redundancy protocols (FHRPs), do use multicast. See Chapter 3 for more information.

  10. A. An access point (AP) forms a single Control and Provisioning of Wireless Access Points (CAPWAP) tunnel with a wireless LAN controller (WLC). See Chapter 4 for more information.

  11. C. In an intracontroller roam, the client associates with a different AP that's connected to the same WLAN controller. Neither the VLAN nor the Service Set Identifier (SSID) changes. Because the client's IP address didn't change, you can conclude this is a layer 2 roam. See Chapter 4 for more information.

  12. A, C. 5.4 GHz Wi-Fi standards include 802.11n and 802.11ac, but not 802.11g. 5.4 GHz offers higher throughput, but at the price of increased free space path loss. See Chapter 4 for more information.

  13. B. The first Open Shortest Path First (OSPF) router to become active on a subnet becomes the designated router (DR) for the subnet. It's commonly taught that the DR is chosen based on the highest router ID, but the first OSPF router to become active always becomes the DR. A DR election occurs only when the existing DR and backup DR fail. See Chapter 5 for more information.

  14. B, C. Network types don't have to match in order to form an adjacency, but they do need to match in order for the routers to exchange routes. See Chapter 5 for more information.

  15. D. When an interface is configured as a passive interface, OSPF will advertise the prefix for that interface, but will not form an adjacency with other routers on the subnet. See Chapter 5 for more information.

  16. C. The route is an external Enhanced Interior Gateway Routing Protocol (EIGRP) route, so it has an administrative distance of 170. See Chapter 6 for more information.

  17. A, B. By default, only bandwidth and delay are used in calculating the metric. See Chapter 6 for more information.

  18. B. 10.0.56.6 is the feasible successor. See Chapter 6 for more information.

  19. C. Border Gateway Protocol (BGP) uses the autonomous system (AS) path for loop prevention. Upon receiving a route with its own AS in the AS path, an exterior Border Gateway Protocol (eBGP) router will discard the route, meaning it won't install it in its BGP Routing Information Base (RIB) or IP routing table, nor will it advertise the route. See Chapter 7 for more information.

  20. A. 172.16.0.0/24 doesn't exist in R1's routing table, so the network command will have no effect. Instead, the redistribute eigrp 16 command will redistribute the 172.16.0.0/16 prefix into BGP with an incomplete origin type. See Chapter 7 for more information.

  21. C. The prefix list matches any prefix with a subnet falling into the 10.0.0.0/8 range with a prefix length from 8 to 32. This includes 10.0.0.0/8, 10.0.0.0/32, and 10.255.255.0/24. The first sequence in the route map is a deny sequence that matches the IP prefix list. Hence, these prefixes will match the sequence and will be denied. The second sequence in the route map is a permit sequence that matches all prefixes that don't match the first sequence. See Chapter 7 for more information.

  22. A. R2 is translating the source address 7.0.0.12 to 2.0.0.2; therefore 7.0.0.12 is the inside local address and 2.0.0.2 is the inside global address. See Chapter 8 for more information.

  23. C. Multicast RIB entries take the form (source, group). The entry indicates that the source—223.3.2.1—has sent multicast traffic to the multicast group address 239.8.7.6. See Chapter 8 for more information.

  24. D. Port address translation—also known as network address translation (NAT) overload—translates multiple inside local source addresses to a single global address. The global address can come from an outside interface or from a pool. See Chapter 8 for more information.

  25. B. CS1 gets a lower priority than CS0. CS0 is the default class and is for best-effort traffic. CS1 is the bottom-of-the-barrel traffic that you may not even want on your network, such as torrents, gaming, or cat videos. See Chapter 9 for more information.

  26. A, C. TCP global synchronization occurs when multiple TCP flows back off, then ramp up simultaneously. This can happen when a queue fills and excess packets are tail-dropped. Weighted random early detection (WRED) randomly drops packets as the queue fills. Explicit congestion notification (ECN) works by getting a TCP sender to slow down the rate at which it sends by reducing its congestion window. See Chapter 9 for more information.

  27. A. The low-latency queuing (LLQ) is serviced before any other queues, so packets in the LLQ won't wait any longer than necessary. The LLQ has a limited bandwidth. See Chapter 9 for more information.

  28. D. The term edge virtual bridging (EVB) describes using a physical switch to pass layer 2 traffic between VMs running on the same host. The IEEE 802.1Qbg standard calls this reflective relay. See Chapter 10 for more information.

  29. B, C. Internet Key Exchange (IKE) uses User Datagram Protocol (UDP) port 500, whereas Encapsulating Security Payload (ESP) uses IP protocol 50. See Chapter 10 for more information.

  30. A, C. By default, Virtual Extensible LAN (VXLAN) uses multicast to flood unknown unicasts, allowing it to perform data plane learning. See Chapter 10 for more information.

  31. C. SD-Access uses VXLAN encapsulation because it can carry Ethernet frames. The others can't. See Chapter 11 for more information.

  32. B. Software-defined networking in a wide area network (SD-WAN) doesn't use BGP. See Chapter 11 for more information.

  33. A. When authenticating using a GET or PUT request, you should get a 200 response code if authentication succeeds. See Chapter 11 for more information.

  34. A. Terminal Access Controller Access-Control System Plus (TACACS+) supports authorization, authentication, and accounting. Remote Authentication Dial-In User Service (RADIUS) doesn't support command authorization. See Chapter 12 for more information.

  35. C. MAC authentication bypass is the only option that can authenticate a machine but not a user. See Chapter 12 for more information.

  36. A, D. You can't use a port access control list (ACL) to block certain control plane traffic, including ARP and Spanning Tree BPDUs. You also can't use an extended IP ACL because ARP and Spanning Tree Protocol (STP) don't use IP. See Chapter 12 for more information.