Implementing Cisco Enterprise Network Core Technologies (ENCOR) v1.2 Quiz Questions and Answers

Which three threats are email-based? (Choose three.)

Answer :
  • spam
  • attachment-based attacks
  • email address spoofing

What is the difference between spear phishing and whaling?

Answer :
  • Both are targeted phishing, but only whaling targets individuals in executive positions.

EIGRP using named mode configuration supports which metric format?

Answer :
  • 64-bit

Which algorithm does OSPF use to calculate the SPF tree?

Answer :
  • Dijkstra

A normal non-backbone area uses what type of router to connect to the backbone area?

Answer :
  • ABR

Which of the following is responsible for the Label Distribution Protocol?

Answer :
  • control plane

Which command displays BFD session summary information per TLOC on vEdge routers?

Answer :
  • show bfd tloc-summary-list

Which two statements are correct? (Choose two.)

Answer :
  • API keys and tokens can expire.
  • An HTTP 405 response must return a list of allowed methods.

Which DNS lookup does an access point perform when attempting CAPWAP discovery?

Answer :
  • CISCO-CAPWAP-CONTROLLER.local

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?

Answer :
  • local WLC