ENCOR – VIRTUALIZATION Welcome to your ENCOR-VIRTUALIZATION 1. Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols? A. GRE B. IKE C. OSPF D. IPsec None 2. How many bytes of overhead are added to each IP packet while it is transported through a GRE tunnel? A. 8 B. 32 C. 16 D. 24 None 3. What is an IPsec protocol that provides data confidentiality and authentication for IP packets? A. IKE B. RSA C. ESP D. AH None 4. . What two encryption algorithms are used in IPsec VPNs? (Choose two.) A. PSK B. 3DES C. IKE D. DH E. AES 5. Which two identification methods are used by LISP instead of traditional IP addresses? (Choose two.) A. xTR B. RLOCs C. MRs D. PxTRs E. EIDs 6. Which LISP header is used to provide a secure boundary between multiple organizations? A. outer LISP UDP header B. outer LISP IP header C. Instance ID D. RLOC None 7. How is routing handled within a LISP site? A. through the use of virtual tunnels B. through the use of virtual controllers C. through the use of an interior routing protocol D. through the use of RLOCs None 8. What is the purpose of a VNI when a company is using VXLANs? A. to map Layer 2 to Layer 3 packets B. to facilitate the discovery of underlay Layer 3 networks C. to uniquely identify overlay networks D. to create a database of EID-to-RLOC mappings None 9. What is the purpose of VTEPs when using VXLANs? A. propagate map replies to end devices B. originate or terminate tunnels C. identify virtual segments within an organization D. provide replies to internal devices when an external device is cloud-based None 10. . What are three characteristics of the generic routing encapsulation (GRE) protocol? (Choose three.) A. Developed by the IETF, GRE is a secure tunneling protocol that was designed for Cisco routers. B. By default, GRE does not include any flow control mechanisms. C. GRE provides encapsulation for a single protocol type that is traveling through the VPN. D. GRE tunnels support multicast traffic. E. GRE uses AES for encryption unless otherwise specified. F. GRE creates additional overhead for packets that are traveling through the VPN. 11. By the use of sequence numbers, which function of the IPsec security services prevents spoofing by verifying that each packet is non-duplicated and unique? A. anti-replay protection B. confidentiality C. authentication D. data integrity None 12. What is the purpose of a proxy ETR used with LISP? A. to communicate with a non-LISP site B. to send map request packets to the MR on behalf of an ETR C. to perform a DNS lookup for any EID within an LISP site D. to register any EID addresses that are not within the mapping database None 13. Which algorithm is considered insecure for use in IPsec encryption? A. AES B. 3DES C. SHA-1 D. RSA None 14. What is the first step in establishing an IPsec VPN? A. creation of a secure tunnel to negotiate a security association policy B. detection of interesting traffic C. negotiation of ISAKMP policies D. creation of an IPsec tunnel between two IPsec peers None 15. What component enables VMs within a virtualized server environment to communicate with each other and with external networks? A. guest OS B. container engine C. vSwitch D. hypervisor None 16. What are three responsibilities of the the NFV virtualized infrastructure manager? (Choose three.) A. performing all FCAPS functions for VNFs B. managing and controlling NFVI hardware resources C. performing life cycle management of all NFVI resources D. creating, maintaining, and tearing down VNF network services E. creating an end-to-end network Fcollecting performance measurements and fault information 17. Which two components of the ETSI NFV architectural framework make up the NFV management and orchestration (MANO)? (Choose two.) A. Virtualized Infrastructure Manager B. NFV infrastructure C. NFV element manager D. OSS/BSS E. NFV orchestrator 18. In an Open vSwitch (OVS) architecture, which component resides in the kernel space and forwards packets from the network stack to the vNIC of the VM? A. emulated PCIe device B. vSwitch C. pNIC driver D. pNIC None 19. What term is used to define the software process that creates VMs and performs hardware abstraction to support VMs? A. hypervisor B. Virtualized Infrastructure Manager (VIM) C. container D. element manager None 20. What function does Cisco DNA Center provide as part of a Cisco enterprise NFV solution? A. VNF life cycle management, monitoring, device programmability, and hardware acceleration B. communication between different VNFs and to the outside world C. CPU, memory, and storage resources to run NVFs and applications D. VNF management and orchestration None 21. What is a limitation when PCI Passthrough is deployed? A. CPU utilization in increased. B. VNFs cannot share pNICs. C. Traffic between VNFs must be switched by an external switch. D. A dedicated CPU core is required to poll pNICs and process incoming data. None 22. What is the function provided by the OSS/BSS components of the ETSI NFV architectural framework? A. They collect performance measurements and fault information. B. They support network systems and services that run business operations. C. They perform all FCAPS functions for VNFs. D. They perform life cycle management of all NFVI resources. None 23. What is a characteristic of a virtual machine? A. It is lightweight and small in size. B. It leverages the kernel of the host OS for fast load times. C. It is equipped with a guest OS. D. It includes only components required to run an application. None 24. Refer to the exhibit. A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two). A. Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4. B. Create an IPsec profile, associate the transform-set. and apply the profile to the tunnel interface. C. Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24. D. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL E. Create an IPsec profile, associate the transform-set ACL. and apply the profile to the tunnel interface 25. A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent? A. container B. Type 1 hypervisor C. hardware pass-thru D. Type 2 hypervisor None 26. Which method should an engineer use to deal with a long-standing contention issue between any two VMsCon the same host? A. Adjust the resource reservation limits B. Live migrate the VM to another host C. Reset the VM D. Reset the host None 27. What is the function of a VTEP in VXLAN? A. provide the routing underlay and overlay for VXLAN headers B. dynamically discover the location of end hosts in a VXLAN fabric C. encapsulate and de-encapsulate traffic into and out of the VXLAN fabric D. statically point to end host locations of the VXLAN fabric None 28. Refer to the exhibit. A network engineer configures a GRE tunnel and enters the show interface tunnel command. What does the output confirm about the configuration? A. The keepalive value is modified from the default value. B. Interface tracking is configured. C. The tunnel mode is set to the default. D. The physical interface MTU is 1476 bytes. None 29. Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel? A. MTU B. Window size C. MRU D. MSS None 30. What is a benefit of a virtual machine when compared with a physical server? A. Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware. B. Virtual machines increase server processing performance. C. The CPU and RAM resources on a virtual machine cannot be affected by other virtual machines. D. Deploying a virtual machine is technically less complex than deploying a physical server. None 31. What are two benefits of virtual switching when compared to hardware switching? (Choose two.) A. increased MTU size B. hardware independence C. VM-level isolation D. increased flexibility E. extended 802.1Q VLAN range 32. What is the function of the LISP map resolver? A. to send traffic to non-LISP sites when connected to a service provider that does not accept nonroutable EIDs as packet sources B. to connect a site to the LISP-capable part of a core network, publish the EID-to-RLOC mappings for the site and respond to map-request messages C. to decapsulate map-request messages from ITRs and forward the messages to the MS D. to advertise routable non-USP traffic from one address family to LISP sites in a different address family None 33. What is a characteristic of a virtual machine? A. It must be aware of other virtual machines, in order to allocate physical resources for them B. It is deployable without a hypervisor to host it C. It must run the same operating system as its host D. It relies on hypervisors to allocate computing resources for it None 34. What is the purpose of the LISP routing and addressing architecture? A. It creates two entries for each network node, one for Its identity and another for its location on the network. B. It allows LISP to be applied as a network visualization overlay though encapsulation. C. It allows multiple Instances of a routing table to co-exist within the same router. D. It creates head-end replication used to deliver broadcast and multicast frames to the entire network. None 35. What are two characteristics of VXLAN? (Choose two) A. It uses VTEPs to encapsulate and decapsulate frames. B. It has a 12-bit network identifier C. It allows for up to 16 million VXLAN segments D. It lacks support for host mobility E. It extends Layer 2 and Layer 3 overlay networks over a Layer 2 underlay. 36. Which two components are supported by LISP? (choose two ) A. proxy ETR B. egress tunnel router C. route reflector D. HMAC algorithm E. spoke 37. A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify? A. The tunnel will be established and work as expected B. The tunnel destination will be known via the tunnel interface C. The tunnel keepalive is configured incorrectly because they must match on both sites D. The default MTU of the tunnel interface is 1500 byte. None 38. Refer to the exhibit. MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared? A. The packet arrives on router C without fragmentation. B. The packet is discarded on router A C. The packet is discarded on router B D. The packet arrives on router C fragmented. None 39. Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show? A. ISAKMP SA is authenticated and can be used for Quick Mode. B. Peers have exchanged keys, but ISAKMP SA remains unauthenticated. C. VPN peers agreed on parameters for the ISAKMP SA D. ISAKMP SA has been created, but it has not continued to form. None 40. Which entity is a Type 1 hypervisor? A. Oracle VM VirtualBox B. VMware server C. Citrix XenServer D. Microsoft Virtual PC None 41. Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment? A. switch fabric B. VTEP C. VNID D. host switch None 42. Which LISP component is required for a LISP site to communicate with a non-LISP site? A. ETR B. ITR C. Proxy ETR D. Proxy ITR None 43. What Is the process for moving a virtual machine from one host machine to another with no downtime? A. high availability B. disaster recovery C. live migration D. multisite replication None 44. How does a Type 2 hypervisor function? A. It runs on a virtual server and includes its own operating system. B. It runs directly on a physical server and includes its own operating system. C. It is installed as an application on an already installed operating system. D. It enables other operating systems to run on it. None 45. Which element enables communication between guest VMs within a virtualized environment? A. hypervisor B. vSwitch C. virtual router D. pNIC None 46. What is required for a virtual machine to run? A. a Type 1 hypervisor and a host operating system B. a hypervisor and physical server hardware C. only a Type 1 hypervisor D. only a Type 2 hypervisor None 47. Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic? A. bridge domain B. VLAN C. VRF D. VNI None 48. Refer to the exhibit. A GRE tunnel has been created between HO and BR routers. What is the tunnel IP on the HQ router? A. 10.111.111.1 B. 10.111.111.2 C. 209.165.202.130 D. 209.165.202.134 None 49. Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network? A. VLAN B. VTEP C. VXLAN D. VRF None 50. An engineer must configure a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an ethernet interface. Which additional configuration must be made on the tunnel interface? A. (config-if)#tunnel destination B. (config-if)#keepalive C. (config-if)#ip mtu D. (config-if)#ip tcp adjust-mss None 51. What is a benefit of Type 1 hypervisors? A. Administrators are able to load portable virtual machine packages in OVA or QCOW2 formats. B. Network engineers are able to create virtual networks o interconnect virtual machines in Layer 2 topologies C. Operators are able to leverage orchestrators to manage workloads that run on multiple Type 1 hypervisors D. Storage engineers are able to leverage VMDK files to provide storage to virtual machine. None 52. Which LISP device is responsible for publishing EID-to-RLOC mappings for a site? A. ETR B. MS C. ITR D. MR None 53. Which three resources must the hypervisor make available to the virtual machines? (Choose three) A. memory B. bandwidth C. IP address D. processor E. storage F. secure access 54. What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system? A. host B. mainframe C. container D. virtual machine None 55. What is a characteristic of a type 2 hypervisor? A. ideal for data center B. complicated deployment C. ideal for client/end-user system D. referred to as bare-metal None 56. What is a type 2 hypervisor? A. Installed as an application on an already installed operating system. B. Runs directly on a physical server and includes its own operating system. C. Supports over-allocation of physical resources. D. Also referred to as a "bare metal hypervisor" because it sits directly on the physical server. None 57. Which two GRE features are configured to prevent fragmentation? (Choose two.) A. TCP MSS B. PMTUD C. DF bit Clear D. MTU ignore E. IP MTU F. TCP window size 58. How are map-register messages sent in a LISP deployment? A. egress tunnel routers to map resolvers to determine the appropriate egress tunnel router B. ingress tunnel routers to map servers to determine the appropriate egress tunnel router C. egress tunnel routers to map servers to determine the appropriate egress tunnel router D. ingress tunnel routers to map resolvers to determine the appropnate egress tunnel router None 59. Which VXLAN component is used to encapsulate and decapsulate Ethernet frames? A. VNI B. GRE C. VTEP D. EVPN None 60. Which resource is able to be shared among virtual machines deployed on the same physical server? A. disk B. operating system C. VM configuration file D. applications None 61. What is a characteristic of a Type 2 hypervisor? A. It is completely independent of the operating system. B. It is installed on an operating system and supports other operating systems. C. It eliminates the need for an underlying operating system. D. Its main task is to manage hardware resources between different operating systems. None 62. What is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor? A. better application performance B. Improved security because the underlying OS is eliminated C. Improved density and scalability D. ability to operate on hardware that is running other OSs None 63. In a Cisco SD-Access fabric, which control plane protocol is used for mapping and resolving endpoints? A. DHCP B. VXLAN C. SXP D. LISP None 64. The following system log message is presented after a network administrator configures a GRE tunnel: %TUN-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing. Why is Tunnel 0 disabled? A. Because dynamic routing is not enabled B. Because the tunnel cannot reach its tunnel destination C. Because the best path to the tunnel destination is through the tunnel itself D. Because the router cannot recursively identify its egress forwarding interface. None 65. Which solution supports end to end line-rate encryption between two sites? A. IPsec B. TrustSec C. MACseC D. GRE None 66. Which hypervisor requires a host OS to run and is not allowed to directly access the hosts hardware and resources? A. native B. bare metal C. type 1 D. type 2 None 67. Which of the following are examples of Type 2 hypervisors? (Choose three.) A. VMware ESXi B. Oracle VirtualBox C. Oracle Solaris Zones D. Microsoft Hyper-V E. Microsoft Virtual PC 68. What is a characteristic of VXLAN? A. It extends Layer 2 and Layer 3 overlay networks over a Layer 2 underlay B. It has a 12-byte packet header C. It uses TCP for transpor D. It is a multi-tenant solution None 69. What is the purpose of the weight attribute in an EID-to-RLOC mapping? A. It determines the administrative distance of LISP generated routes in the RIB. B. It indicates the load-balancing ratio between ETRs of the same priority. C. It indicates the preference for using LISP over native IP connectivity. D. It identifies the preferred RLOC address family. None 70. What does the destination MAC on the outer MAC header identify in a VXLAN packet? A. thee emote spine B. the next hop C. the leaf switch D. the remote switch None 71. What is a Type 1 hypervisor? A. runs directly on a physical server and depends on a previously installed operating system B. runs directly on a physical server and includes its own operating system C. runs on a virtual server and depends on an already installed operating system D. run on a virtual server and includes its own operating system None 72. Refer to the exhibit. Which GRE tunnel configuration command is missing on R2? A. tunnel source 192.181 B. tunnel source 172.16.1.0 C. tunnel source 200.1.1.1 D. tunnel destination 200.1.1.1 None 73. What is a characteristic of a Type 1 hypervisor? A. It is referred to as a hosted hypervisor. B. It is completely independent of the operating system. C. Problems in the base operating system can affect the entire system. D. It is installed on an operating system and supports other operating systems above it. None 74. Refer to the exhibit. An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEthemet1 interface. Which two commands must be added to the existing configuration to accomplish this task? (Choose two) A. Router(config-vrf)#address-family ipv6 B. Router(config-if)#ip address 192.168.1.1 255.255.255.0 C. Router(config-vrf)Sip address 192.168.1.1 255.255.255.0 D. Router(config-if)=address-family ipv4 E. Router(config-vrf)#address-family ipv4 75. Which LISP component decapsulates messages and forwards them to the map server responsible for the egress tunnel routers? A. Router Locator B. Map Resolver C. Proxy ETR D. Ingress Tunnel Router None 76. What function does VXLAN perform in a Cisco SD-Access deployment? A. policy plane forwarding B. control plane forwarding C. data plane forwarding D. systems management and orchestration None 77. Which technology reduces the implementation of STP and leverages both unicast and multicast? A. VSS B. VXLAN C. VPC D. VLAN None 78. Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site? A. map server B. map resolver C. ingress tunnel router D. egress tunnel router None 79. What is one characteristic of VXLAN? A. It supports a maximum of 4096 VLANs. B. It supports multitenant segments. C. It uses STP to prevent loops in the underlay network. D. It uses the Layer 2 header to transfer packets through the network underlay. None 80. Which element is unique to a Type 2 hypervisor? A. memory B. VM OS C. host OS D. host hardware None 81. Witch two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.) A. Use a single trunk link to an external Layer2 switch. B. Use a virtual switch provided by the hypervisor. C. Use a virtual switch running as a separate virtual machine. D. Use a single routed link to an external router on stick. E. Use VXLAN fabric after installing VXLAN tunneling drivers on the virtual machines. 82. Which capability does a distributed virtual switch have? A. use floating static routes B. provide centralized management for virtual switches C. run dynamic routing protocols D. use advanced IPsec encryption algorithms None 83. Which LISP infrastructure device provides connectivity between non-sites and LISP sites by receiving non-LISP traffic with a LISP site destination? A. PETR B. PITR C. map resolver D. map server None 84. Which device, in a LISP routing architecture, receives and de-encapsulates LISP traffic for endpoints within a LISP-capable site? A. MR B. ETR C. OMS D. ITR None 85. Which action limits the total amount of memory and CPU that is used by a collection of VMs? A. Place the collection of VMs in a resource pool. B. Place the collection of VMs in a vApp. C. Limit the amount of memory and CPU that is available to the cluster. D. Limit the amount of memory and CPU that is available to the individual VMs. None 86. What is one role of the VTEP in a VXLAN environment? A. to forward packets to non-LISP sites B. to encapsulate the tunnel C. to maintain VLAN configuration consistency D. to provide EID-to-RLOC mapping None 87. What is a characteristic of para-virtualization? A. Para-virtualization guest servers are unaware of one another B. Para-virtualization allows direct access between the guest OS and the hypervisor C. Para-virtualization allows the host hardware to be directly accessed D. Para-virtualization lacks support for containers None 88. Which function does a virtual switch provide? A. CPU context switching (or multitasking between virtual machines B. RAID storage for virtual machines C. emulation of power for virtual machines. D. connectivity between virtual machines None 89. Which statement about VXLAN is true? A. VXLAN uses TCP 35 the transport protocol over the physical data cento network. B. VXLAN extends the Layer 2 Segment ID field to 24-bits. which allows up to 4094 unique Layer 2 segments over the same network. C. VXLAN encapsulates a Layer 2 frame in an IP-UDP header, which allows Layer 2 adjacency across router boundaries. D. VXLAN uses the Spanning Tree Protocol for loop prevention. None 90. Which statement about route targets is true when using VRF-Lite? A. When BGP is configured, route targets are transmitted as BGP standard communities. B. Route targets control the import and export of routes into a customer routing table. C. Route targets allow customers to be assigned overlapping addresses. D. Route targets uniquely identify the customer routing table. None 91. Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors? A. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes. B. Each virtual machine requires a unique IP address but shares the MAC address with the physical server. C. Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server. D. Each virtual machine requires a unique MAC address but shares the IP address with the physical server. None 92. What are two benefit of virtualizing the server with the use of VMs in data center environment? (Choose two.) A. Increased security B. reduced rack space, power, and cooling requirements C. reduced IP and MAC address requirements D. speedy deployment E. smaller Layer 2 domain 93. Which two namespaces does the LISP network architecture and protocol use? (Choose two.) A. TLOC B. RLOC C. DNS D. VTEP E. EID 94. Which two entities are Type 1 hypervisors? (Choose two.) A. Oracle VM VirtualBox B. Microsoft Hyper-V C. VMware server D. VMware ESX E. Microsoft Virtual PC 95. Which action is a function of VTEP in VXLAN? A. tunneling traffic from IPv6 to IPv4 VXLANs B. allowing encrypted communication on the local VXLAN Ethernet segment C. encapsulating and de-encapsulating VXLAN Ethernet frames D. tunneling traffic from IPv4 to IPv6 VXLANs None 96. Which two LISP infrastructure elements are needed to support LISP to non-LISP internetworking? (Choose two) A. PETR B. PITR C. MR D. MS E. ALT 97. How is CAPWAP data traffic encapsulated when running an Over the Top WLAN in a Cisco SD-Access wireless environment? A. LISP B. VXLAN C. GRE D. IPsec None 98. Which action is a LISP ITR responsible for? A. responding to map-request messages B. forwarding user data traffic C. finding EID-to-RLOC mappings D. accepting registration requests from ETRs None 99. What is contained in the VXLAN header? A. VXLAN network identifier B. source and destination RLOC ID C. endpoint ID D. original Layer 2 VLAN ID None 100. Which virtualization component creates VMs and performs hardware abstraction that allows multiple VMs to run at the same time? A. container B. Docker C. hypervisor D. rkt None 101. Which capability does a distributed virtual switch have? A. use floating static routes B. provide configuration consistency across the hosts C. run dynamic routing protocols D. use advanced IPsec encryption algorithms None 102. Which resource must the hypervisor make available to the virtual machines? A. bandwidth B. IP address C. processor D. secure access None 103. Which two statements about VRF-lite are true? (Choose two) A. It can support multiple customers on a single switch B. It supports most routing protocols, including EIGRP, ISIS, and OSPF C. It should be used when a customer's router is connected to an ISP over OSPF D. It can increase the packet switching rate E. It supports MPLS-VRF label exchange and labeled packets 104. What is the main function of VRF-lite? A. To connect different autonomous systems together to share routes B. To allow devices to use labels to make Layer 2 Path decisions C. To route IPv6 traffic across an IPv4 backbone D. To segregate multiple routing tables on a single device None 105. Refer to the exhibit. Which LISP component do routers in the public IP network use to forward traffic between the two networks? A. RLOC B. map resolver C. EID None 106. Into which two pieces of information does the LISP protocol split the device identity? (Choose two) A. Device ID B. Enterprise Identifier C. LISP ID D. Routing Locator E. Resource Location F. Endpoint Identifier 107. Which statement about LISP encapsulation in an EIGRP OTP implementation is true? A. LISP learns the next hop B. OTP uses LISP encapsulation to obtain routes from neighbors C. OTP uses LISP encapsulation for dynamic multipoint tunneling D. OTP maintains the LISP control plane None 108. A customer has deployed an environment with shared storage to allow for the migration of virtual machines between servers with dedicated operating systems that provide the virtualization platform. What is this operating system described as? A. hosted virtualization B. type 1 hypervisor C. container oriented D. decoupled None 109. A network administrator added a new spoke site with dynamic IP on the DMVPN network. Which configuration command passes traffic on the DMVPN tunnel from the spoke router? A. ip nhrp registration dynamic B. ip nhrp registration ignore C. ip nhrp registration no-registration D. ip nhrp registration no-unique None 110. A newly installed spoke router is configured for DMVPN with the ip mtu 1400 command. Which configuration allows the spoke to use fragmentation with the maximum negotiated TCP MTU over GRE? A. ip tcp adjust-mss 1360 crypto ipsec fragmentation after-encryption B. ip tcp adjust-mss 1360 crypto ipsec fragmentation mtu-discovery C. ip tcp payload-mtu 1360 crypto ipsec fragmentation mtu-discovery D. ip tcp payload-mtu 1360 crypto ipsec fragmentation after-encryption None 111. Select the prerequisites for configuring LISP from the below options. (Choose two.) A. Determine the type of LISP deployment you intend to deploy B. One can directly deploy LISP without determining the type. C. LISP configuration requires the datak9 license. D. LISP configuration requires the advanced ip services license. 112. Please select the correct option that shows the correct combination for the Type 1 Hypervisor. A. Hardware; Hypervisor; Guest OS B. Hardware; Host OS; Hypervisor; Guest OS C. Host OS; Hypervisor; Guest OS D. Hardware; Host OS; Guest OS None 113. In a Cisco VXLAN based network, which of the following best describes the main function of a VXLAN Tunnel Endpoint (VTEP)? A. A device that performs VXLAN encapsulation and decapsulation B. It is a 24 bit segment ID that defines the broadcast domain. C. It is the Logical interface where the encapsulation and de-encapsulation occurs. D. It is a device that performs tunneling using GRE. None 114. Which of the following are benefits from implementing the use of VXLAN's in a network? (Choose two) A. Increased scalability since VXLAN extends the IF field to 24 bits, providing up to 16 million unique ID values B. Makes the implementation of Spanning Tree more efficient. C. Can be used to replace layer 3 routing protocols and increase routing efficiency at layer 2. D. Supports Equal Cost Multi-pathing (ECMP) so that load balancing over multiple links can be used. 115. You have configured router R1 with multiple VRF's in order to support multiple customer VPN networks. If you wanted to see the best path for the 10.2.1.0.24 route in VRF Green, what command would you use? A. show ip route vrf Green 10.2.1.0 B. show ip route 10.2.1.0 vrf Green C. show route all 10.2.1.0 D. show ip route 10.2.1.0 Green None 116. Which Cisco Locator/ID Separation Protocol (LISP) device receives packets from remote site facing devices and either decapsulates the LISP packets or routes them natively? A. ITR B. ETR C. MS D. MR None 117. In a Cisco SD-Access network where VXLAN is used for encapsulating data packets, what is the minimum MTU setting that devices should be configured with? A. 1492 B. 1500 C. 1518 D. 1550 None 118. What is a characteristic of a Type 2 hypervisor? A. It is installed on an operating system and supports other operating systems above it. B. It is referred to as a hosted C. Problems in the base operating system can affect the entire system. D. It is completely independent of the operating None 119. Which device, in a LISP router architecture, receives LISP map requests and determines which ETR should handle the map request? A. proxy ETR B. routing locator C. map resolver D. map server None 120. What is the function of a VTEP in VXLAN? A. provide the routing underlay and overlay for VXLAN headers B. dynamically discover the location of end hosts in a VXLAN fabric C. encapsulate and de-encapsulate traffic into and out of the VXLAN fabric D. statically point to end host locations of the VXLAN fabric None 121. What Is the process for moving a virtual machine from one host machine to another with no downtime? A. high availability B. disaster recovery C. live migration D. multisite replication None 1 out of 121 Time's up