0% found this document useful (0 votes)
111 views79 pages

CCNP ENCOR v8 Certification Practice Exam Answers

The document provides practice exam answers for the CCNP ENCOR v8 certification, detailing various modules and their corresponding checkpoint exams. It includes questions and explanations on topics such as NTP, QoS, SD-WAN architecture, and Cisco technologies. The content is aimed at helping candidates prepare for the certification exam with a focus on key networking concepts and practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views79 pages

CCNP ENCOR v8 Certification Practice Exam Answers

The document provides practice exam answers for the CCNP ENCOR v8 certification, detailing various modules and their corresponding checkpoint exams. It includes questions and explanations on topics such as NTP, QoS, SD-WAN architecture, and Cisco technologies. The content is aimed at helping candidates prepare for the certification exam with a focus on key networking concepts and practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 79

10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

 IT Questions Bank  IOS Command List  Ebooks  IP Calculators »  Donations Search the site 

 Home  CCNA » Security » CyberOps »

 IT Questions Bank  IOS Command List CCNA » CCNA Security v2.0 » Cybersecurity » Networking Essentials

IP Subnet Calculators » Donation Contact

[NEW] CCNP v8 Exam Answers

CCNPv8 ENCOR CCNPv8 ENARSI

Modules 1-5 | Checkpoint Exam: L2


Redundancy Exam

Modules 6-7 | Checkpoint Exam:


Routing Essentials and EIGRP Exam

Modules 8-10 | Checkpoint Exam:


OSPF Exam

Modules 11-12 | Checkpoint Exam:
BGP Exam

Modules 13-14 | Checkpoint Exam:


Multicast and QoS Exam

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 1/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

CCNP ENCOR v8 Certification Practice Exam Modules 15-16 | Checkpoint Exam: IP


Answers Services and VPNs Exam

 Jan 4, 2021 |  Last Updated: Mar 31, 2025 |  CCNPv8 ENCOR |  13 Comments Modules 17-19 | Checkpoint Exam:
Wireless Essentials Exam

Modules 20-21 | Checkpoint Exam:


Recommended videos Powered by Snigel
Wireless Security and Connectivity
Exam

Modules 22-24 | Checkpoint Exam:


Network Design and Monitoring Exam

Modules 25-26 | Checkpoint Exam:


Access Control and Infrastructure
Security Exam

Modules 27-29 | Checkpoint Exam:


Virtualization, Automation, and
Programmability Exam

ENCOR Skills Assessment


(Scenario 1+2) Exam Answers

CCNP ENCOR v8 Hands On Skills


Exam Answers

CCNPv8 ENCOR Course Final 


CCNP ENCOR (350-401) Certification Practice Exam Exam Answers

CCNP ENCOR v8 Certification


How to find: Press “Ctrl + F” in the browser and fill in whatever wording is Practice Exam Answers
in the question to find that question/answer. If the question is not here, find it
in Questions Bank.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 2/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

NOTE: If you have the new question on this test, please comment
CCNP RS 7.0 Exam Answers
Question and Multiple-Choice list in form below this article. We will
update answers for you in the shortest time. Thank you! We truly value ROUTE SWITCH TSHOOT
your contribution to the website.
CCNP ROUTE - Chapter 1

CCNP ROUTE - Chapter 2


1. Which two statements are true about NTP servers in an enterprise
network? (Choose two.) CCNP ROUTE - Chapter 3

NTP servers at stratum 1 are directly connected to an authoritative time CCNP ROUTE - Chapter 4
source.
CCNP ROUTE - Chapter 5
All NTP servers synchronize directly to a stratum 1 time source.
NTP servers control the mean time between failures (MTBF) for key network CCNP ROUTE - Chapter 6

devices. CCNP ROUTE - Chapter 7


There can only be one NTP server on an enterprise network.
NTP servers ensure an accurate time stamp on logging and debugging CCNP ROUTE - Chapter 8

information. CCNPv6 ROUTE - Final Exam

CCNPv7 ROUTE - Final Answers


Explanation: Network Time Protocol (NTP) is used to synchronize the time
across all devices on the network to make sure accurate timestamping on
devices for managing, securing and troubleshooting. NTP networks use a 
hierarchical system of time sources. Each level in this hierarchical system is
called a stratum. The stratum 1 devices are directly connected to the Related Posts
authoritative time sources.
24.1.5 Lab – Implement SPAN Technologies
(Answers)

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 3/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

2. The command ntp server 10.1.1.1 is issued on a router. What impact does CCNP ENCOR v8 Chapters 13 – 14: Multicast
and QoS Test Online
this command have?
CCNPv8 ENCOR Labs Packet Tracer Activities
identifies the server on which to store backup configurations
Answers Instruction
determines which server to send system log files to
ensures that all logging will have a time stamp associated with it 15.1.2 Lab – Implement NTP (Answers)

synchronizes the system clock with the time source with IP address 4.1.2 Lab – Implement MST (Answers)
10.1.1.1
Chapter 5: Quiz – VLAN Trunks and
EtherChannel Bundles (Answers) CCNPv8
Explanation: The ntp server ip-address global configuration command ENCOR
configures the NTP server for IOS devices.
Chapters 8 – 10: OSPF Exam (Answers)

8.1.2 Lab – Implement Single-Area OSPFv2


3. A network engineer has to decide between a Layer 2 Access Layer (STP- (Answers)
based) and a Layer 3 Access Layer (Routed access) campus design option.
16.1.4 Lab – Implement GRE over IPsec Site-
Which statement must be considered for a decision to be made?
to-Site VPNs (Answers)
The STP based option does not require FHRP, whereas the Routed access
12.1.2 Lab – Implement BGP Path Manipulation
option does. (Answers)
The Routed access option offers easier troubleshooting than the STP-
based option.
Recent Comments
The STP based access option supports spanning VLANs across multiple
access switches, whereas the Routed access option does not. Shane on CCNA 3 v7 Modules 1 – 2: OSPF
Concepts and Configuration Exam Answers
The Routed access option is the best cost-effective solution.

Chomie on CCNA 2: SRWE Practice PT Skills
Assessment (PTSA) – Part 1 Answers
Explanation: The Routed access design has a number of advantages over
the STP-based design: Guz on Cybersecurity Essentials FINAL Quiz
Answers Full Questions
No FHRP required – no need for FHRP protocols such as HSRP and VRRP.
No STP required – since there are no L2 links to block, this design removes siri on Introduction to Cybersecurity: Course

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 4/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

the need for STP. Final Exam Answers


Easier troubleshooting – It offers common end-to-end troubleshooting tools dan on CCNPv8 ENCOR (Version 8.0) – FINAL
(such as ping and traceroute). EXAM Answers
The Routed access is an excellent design for many environments, but it has
the same limitation as the STP-based design, in which it does not support
spanning VLANs across multiple access switches. Additionally, it might not
be the most cost-effective solution because access layer switches with Layer
3 routing capability might cost more than Layer 2 switches do.

4. Which three functions are performed at the distribution layer of the


hierarchical network model? (Choose three.)

isolates network problems to prevent them from affecting the core layer
provides a connection point for separate local networks
forwards traffic that is destined for other networks
allows end users to access the local network
transports large amounts of data between different geographic sites
forwards traffic to other hosts on the same logical network

Explanation: The primary function of the distribution layer is to aggregate


access layer switches in a given building or campus. The distribution layer
provides a boundary between the Layer 2 domain of the access layer and the 
Layer 3 domain of the core. On the Layer 2 side, it creates a boundary for
Spanning Tree Protocol (STP), limiting propagation of Layer 2 faults. On the
Layer 3 side, it provides a logical point to summarize IP routing information
when it enters the core Layer. The summarization reduces IP route tables for

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 5/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

easier troubleshooting and reduces protocol overhead for faster recovery


from failures.

5. Which SD-Access feature uses telemetry to enable proactive prediction of


network-related and security-related risks.

policy enforcement
network assurance and analytics
network virtualization
network automation

Explanation: Through the use of telemetry, the network assurance and


analytics feature of SD-Access improves the performance of the network
through proactive prediction of network-related and security-related risks.

6. Which function is provided by the Cisco SD-Access Architecture


management layer?

It delivers data packets to and from the network devices participating in SD-
Access.
It interconnects all of the network devices, forming a fabric of interconnected
nodes.
It presents all information to the user on a centralized dashboard. 
It provides all of the management subsystems for the management layer.

Explanation: The management layer of the Cisco SD-Access Architecture


abstracts all the complexities and dependencies of the other layers and

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 6/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

provides the user with GUI tools and workflows to manage and operate the
Cisco DNA network.

7. Which SD-WAN solution architecture component authenticates the


vSmart controllers and SD-WAN routers and facilitates their ability to join
the network?

vManage Network Management System


vAnalytics
vBond orchestrator
vSmart controller

Explanation: The Cisco SD-WAN solution has four main components:


The vManage Network Management System (NMS) is the single pane of
glass for managing the SD-WAN solution.
The vSmart controller acts as the brains of the solution.
The SD-WAN routers serve vEdge and cEdge routers.
The vBond orchestrator authenticates and orchestrates connectivity between
SD-WAN routers and vSmart controllers.

8. What two factors are used to achieve end-to-end QoS in the DiffServ

model? (Choose two.)

DSCP
PHB
PCP
DEI

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 7/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

VLAN ID

Explanation: IIn order to deliver end-to-end QoS, DiffServ architecture has


two major components, packet marking using the IPv4 ToS byte and PHBs.
The Differentiated Services (DS) field uses 6 bits to classify packets. DSCP
uses the leftmost six bits from the ToS byte in the IPv4 header to specify
class of service for each IP packet to form the DiffServ (DS) field. With 6 bits,
DSCP has up to 64 DSCP values (0 to 63) that are assigned to various
classes of traffic. These selective values are called per-hop behaviors (PHB)
and determine how packets are treated at each hop along the path from the
source to the destination.

9. What QoS category level is recommended as the best to be configured on


a Cisco WLC for VoIP traffic?

gold
bronze
silver
platinum

Explanation: VoIP traffic is extremely sensitive to delay, and the QoS


category to be set for this type of traffic on a Cisco WLC is platinum.

10. What are the two main components of Cisco Express Forwarding (CEF)?
(Choose two.)

adjacency tables
routing tables

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 8/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

MAC-address tables
forwarding information base (FIB)
ARP tables

Explanation: The forwarding information base (FIB) and adjacency tables


are the main components of CEF. The FIB is similar to a routing table, but
neither the routing table, nor the ARP table, nor the MAC-address table is
part of CEF.

11. What is used to pre-populate the adjacency table on Cisco devices that
use CEF to process packets? ​

the ARP table


the routing table
the FIB
the DSP

Explanation: CEF uses the FIB and adjacency table to make fast forwarding
decisions without control plane processing. The adjacency table is pre-
populated by the ARP table and the FIB is pre-populated by the routing table.​


12. Which technology is part of the Cisco ENFV and provides centralized
and consistent network policies across enterprise branch offices?

Cisco ENCS
Cisco UCS
Cisco DNA center
https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 9/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

Cisco ISE

Explanation: Cisco DNA Center is a main component of the Cisco NFV


solution that provides centralized consistent policies across enterprise
branch offices.

13. What is an I/O technology that allows multiple VNFs to share the same
pNIC?

PCI Passthrough
Open vSwitch
SR-IOV
OVS-DPDK

Explanation: SR-IOV is an enhancement to PCI passthrough that allows


multiple VNFs to share the same pNIC.

14. Which two are functions of LISP? (Choose two.)

It is an overlay tunneling technology.


It performs load balancing of SD-WAN routers across vSmart controllers.
It is an architecture created to address routing scalability problems.
It provides a permanent control plane connection over a DTLS tunnel. 
It authenticates vSmart controllers and SD-WAN routers.

Explanation: Locator/Identifier Separation Protocol (LISP) is used by


Internet providers, data centers, branch networks, and campus networks to
address routing scalability problems and provide an overlay tunneling
https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 10/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

technology. LIST separates IP addresses into endpoint identifiers (EID) and


routing locators (RLOCs) so endpoints can roam from site to site with only
the RLOC changing. An egress tunnel router (ETR), ingress tunnel router
(ITR), proxy ETR, proxy ITR, or xTR, a device that is both an ETR and an
ITR, are used to connect LISP and non-LISP sites in a variety of ways.

15. Match the VNF role with its description. (Not all options are used.)


EMS : responsible for the functional management of the VNFs
VIM : responsible for hardware resources and virtualized resources
BSS : operates in tandem with OSS to improve overall customer experiance

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 11/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

Explanation: Virtual Network Function (VNF) is a software version of a


network function that runs on the hypervisor as a VM.
Virtualized Infrastructure Manager (VIM) is responsible for controlling NFVI
hardware resources and virtualized resources.
Element Managers (EMs) are responsible for the functional management of
the VMs.
NFV orchestrator is responsible for creating, maintaining and tearing down
VNF services.
Business Support System (BSS) works in tandem with OSS (platform
typically operated by service providers) to improve overall customer
experience.

16. Which vitualization component allows communication between VMs


within a virtual server?

container engine
vSwitch
pNIC
hypervisor

Explanation: In a virtualized server the vSwitch is connected to external


networks through physical NICs (pNICs) and to VMs through virtual NICs 
(vNICs).

17. A teacher is explaining the concept of virtual switch (vSwitch) to


students in a classroom. What explanation accurately describe a vSwitch?

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 12/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

A vSwitch is a software-based Layer 3 switch that operates like a physical


switch.
Multiple vSwitches can be created under a virtualized server, allowing
network traffic to flow directly from one vSwitch to another within the same
host.
A vSwitch is a cluster of switches forming a virtual switching system (VSS).
A vSwitch enables VMs to communicate with external physical
networks through physical nework interface cards.

Explanation: A virtual switch (vSwitch) is a software-based Layer 2 switch


that operates like a physical Ethernet switch. A vSwitch enables VMs to
communicate with each other within a virtualized server and with external
physical networks through the physical network interface cards (pNICs.)
Multiple vSwitches can be created under a virtualized server, but network
traffic cannot flow directly from one vSwitch to another vSwitch within the
same host, and the vSwitches cannot share the same pNIC.

18. What are two characteristics of virtual routing that are different from
traditional routing? (Choose two.)

VRF allows for overlapping IP address ranges.


VRF requires the use of the BGP routing protocol. 
VRF requires creating subinterfaces if VRF is to be enabled.
Each VRF instance has its own routing table.
VRF takes advantages of Layer 2 technologies such as spanning tree.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 13/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

Explanation: Virtual routing and forwarding (VRF) is a Layer 3 technology


used to create separate virtual routers on a physical router. Each VRF
instance has associated router interface(s) or subinterface(s), routing table,
and forwarding table. Overlapping and even duplicate IP addresses can be
used when using VRF because VRF creates segmentation between the
interfaces, IP addresses, and routing tables.

19. What is a key difference between a virtual machine and a virtualized


container?

A virtual machine starts much faster than a virtualized container does.


A virtual machine uses physical memory to run and a virtualized container
uses virtualized memory.
A virtual machine requires a type 1 hypervisor and a virtualized container
requires a type 2 hypervisor.
A virtual machine contains its own OS and a virtualized container does
not.

Explanation: A virtual machine (VM) is a software emulation of a physical


server with an operating system. A container is an isolated environment
where containerized applications run. Containers all share the same OS
while remaining isolated from each other. They all use virtualized memory 
managed by the hypervisor. Because a container does not have a guest OS,
it relies on the host operating system to provide underlying services. It
typically takes a few seconds to start.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 14/79
10/22/25, 3:38 PM CCNP ENCOR v8 Certification Practice Exam Answers

20. A network engineer wants to increase the overall efficiency and cost-
effectiveness of a server by maximizing the use of available resources
through virtualization. The engineer is considering VMs or containers. What
is the difference between these two types of virtualization?

VMs take minutes to start, whereas containers take seconds to start.


VMs do not include a guest OS, whereas containers do.
VMs require a type 1 hypervisor directly on the system hardware, whereas
containers require a type 2 hypervisor.
VMs share the same operating system, whereas each container requires a
dedicated operating system.

Explanation: Each VM on a server has an dedicated OS and all containers


on a server share the host OS while remaining isolated from each other. A
VM contains a guest OS. Containers do not contain one, so they are
lightweight (small in size). When a VM starts, the guest OS needs to load
first, and once it is operational, the application in the VM can then start and
run. This whole process may take minutes. When a container starts, it
leverages the kernel of the host OS, which is already running, and it typically
takes a few seconds to start.

21. Refer to the exhibit. A network administrator is verifying the bridge ID 


and the status of this switch in the STP election. Which statement is correct
based on the command output?

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 15/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

The bridge priority of Switch_2 has been lowered to a predefined value to


become the backup root bridge.
The bridge priority of Switch_2 has been lowered to a predefined value
to become the root bridge.
The STP instance on Switch_2 is using the default STP priority and the
election is based on Switch_2 MAC address.
The STP instance on Switch_2 is failing due to no ports being blocked and all
switches believing they are the root.

Explanation: The priority value 24576 is a predefined value that is


implemented by the command spanning-tree vlan 10 root primary . This
command configures Switch_2 to become the root switch. A root switch will

have all forwarding interfaces and no root ports.

22. Which three describe characteristics of a virtual machine? (Choose


three.)

it is an isolated environment for applications


https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 16/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

it includes a guest OS
it shares the underlying resources of the host OS
it leverages the kernel of the host OS for quick starts
it is a virtualized physical server
it requires a hypervisor

Explanation: A virtual machine is a software emulation of a physical server


including a CPU, memory, network interface, and operating system. The
hypervisor is virtualization software that performs hardware abstraction. It
allows multiple VMs to run concurrently in the virtual environment.

23. What is a characteristic of the PortFast feature?

PortFast enables a Cisco Catalyst switch to move a port into blocking state
when an attached workstation link comes up.
A trunk port can be configured with PortFast if it connects to a
hypervisor host.
PortFast can only be used for STP host ports.
PortFast prevents alternative ports from becoming designated ports.

Explanation: One of the major benefits of the STP PortFast feature is that

the access ports bypass the earlier 802.1D STP states (learning and
listening) and forward traffic immediately. PortFast can be enabled on trunk
links, but only with ports that are connecting to a single host, such as a
server with only one NIC that is running a hypervisor with VMs on different
VLANs.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 17/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

24. Which three spanning tree protocols are industry standards? (Choose
three.)

PVST+
MSTP
Rapid PVST+
STP
MST
RSTP

Explanation: STP is the 802.1D standard. RSTP is the 802.1W standard.


MSTP is the 802.1S standard. MST, PVST+, and Rapid PVST+ are Cisco
proprietary.

25. Refer to the exhibit. A network administrator issues the show spanning-
tree mst configuration command to verify the MST configuration. How many
VLANs are assigned to IST?

4060
4062
4064
https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 18/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

4094

Explanation: By default, all VLANs are assigned to IST before VLANs are
assigned to other instances. In the configuration shown, IST contains all
VLANs except for the 32 VLANs assigned to instances 1 and 2, which is
4062 VLANs.

26. Refer to the exhibit. A network administrator is verifying the MST


configuration on the switch SW2 with the command:

SW2# show spanning-tree mst interface gigabitEthernet 1/0/1 

Which three conclusions can be drawn based on the output? (Choose


three.)

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 19/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

The priority value of the gigbitEthernet 1/0/1 port is adjusted for the
instance 2.
The gigbitEthernet 1/0/1 port does not connect to another switch that is
out of the region.
The gigbitEthernet 1/0/1 port connects to the internet through a WAN
connection.
The cost value of the gigbitEthernet 1/0/1 port is adjusted for IST.
SW2 does not support the BPDU guard feature.
SW2 does not support the BPDU filter feature.

Explanation: Based on the output, three conclusions can be drawn:


The interface gigbitEthernet 1/0/1 port is not an Edge port. It is inside the
region.
The cost value on the interface gigbitEthernet 1/0/1 port is adjusted to 20
from 20000 for instance 0.
The priority value on the interface gigbitEthernet 1/0/1 port is adjusted to 64
from 128 for instance 2.

27. What are two drawbacks to turning spanning tree off and having
multiple paths through the Layer 2 switch network? (Choose two.)

Port security shuts down all of the ports that have attached devices.
Broadcast frames are transmitted indefinitely. 
The MAC address table becomes unstable.
Port security becomes unstable.
The switch acts like a hub.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 20/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Explanation: Spanning tree should never be disabled. Without it, the MAC
address table becomes unstable, broadcast storms can render network
clients and the switches unusable, and multiple copies of unicast frames can
be delivered to the end devices.

28. Network users complain that the network is running very slowly. Upon
investigation, a network technician discovers 100% link utilization on all the
network devices. Also, numerous syslog messages are being generated
that note continuous MAC address relearning. What is the most likely cause
of the problem?

The routing protocol has been misconfigured and a routing loop is evident.
A Layer 2 STP looping condition is present.
The dynamic routing protocol has not yet converged the network.
An incorrect encapsulation has been configured on one of the trunks that
connect a Layer 2 device to a Layer 3 device within the affected segment.
Keepalives are expected but do not arrive.

Explanation: High CPU consumption and low free memory space are
common symptoms of a Layer 2 forwarding loop. In Layer 2 forwarding
loops, besides constantly consuming switch bandwidth, the CPU spikes as 
well. As the packet is received on a different interface, the switch must move
the MAC address from one interface to the next. The network throughput is
impacted drastically, users will probably notice a slow-down on their network

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 21/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

applications, and the switches might crash because of an exhausted CPU


and low memory resources.

29. Refer to the exhibit. SW1 is the root bridge and SW2 is the backup root
bridge. An administrator wants to prevent SW4 and SW5 from ever
becoming root bridges, but still allow SW2 to maintain connectivity to SW1
via SW3 if the link connecting SW1 to SW2 fails. On which two ports in this
topology should the administrator configure root guard to accomplish this?
(Choose two.)

SW5 Gi0/3 port toward SW3


SW2 Gi0/4 port toward SW4
SW3 Gi0/5 port toward SW5
https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 22/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

SW4 Gi0/6 port toward SW5


SW4 Gi0/2 port toward SW2

Explanation: Root guard is an STP feature that is enabled on a port-by-port


basis. It prevents a configured port from becoming a root port. Root guard
prevents a downstream switch from becoming a root bridge in a topology.
Root guard is placed on designated ports toward other switches that should
never become root bridges. In order to prevent SW4 and SW5 from
becoming root bridges, root guard has to be placed on SW2 Gi0/4 port
toward SW4 and on SW3 Gi0/5 port toward SW5.

30. Refer to the exhibit. A network administrator has connected two


switches together using EtherChannel technology. If STP is running, what
will be the end result?

The resulting loop will create a broadcast storm.


The switches will load balance and utilize both EtherChannels to forward
packets.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 23/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Both port channels will shutdown.


STP will block one of the redundant links.

Explanation: Cisco switches support two protocols for negotiating a channel


between two switches: LACP and PAgP. PAgP is Cisco-proprietary. In the
topology shown, the switches are connected to each other using redundant
links. By default, STP is enabled on switch devices. STP will block redundant
links to prevent loops.

31. A new switch is to be added to an existing network in a remote office.


The network administrator does not want the technicians in the remote
office to be able to add new VLANs to the switch, but the switch should
receive VLAN updates from the VTP domain. Which two steps must be
performed to configure VTP on the new switch to meet these conditions?
(Choose two.)

Enable VTP pruning.


Configure all ports of both switches to access mode.
Configure the existing VTP domain name on the new switch.
Configure the new switch as a VTP client.
Configure an IP address on the new switch.

Explanation: Before the switch is put in the correct VTP domain and in client

mode, the switch must be connected to any other switch in the VTP domain
through a trunk in order to receive/transmit VTP information.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 24/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

32. An OSPF router is forming an adjacency with a neighbor and sends the
neighbor an OSPF DBD packet describing the contents of its link-state
database. During which OSPF neighbor state does the router send the
packet?

exchange
2-Way
attempt
loading

Explanation: In the exchange OSPF neighbor state, two routers exchange


link states using DBD packets that summarize their link-state databases.

33. Which IPv6 address is used by OSPFv3 DR and BDR routers for sending
link-state updates?

FF02::2
FF02::5
FF02::6
FF02::9

Explanation: OSPFv3 DR/BDR routers send link-state updates and link 


acknowledgments to the AllSPFRouter IPv6 multicast address of FF02::5.

34. A network administrator is configuring the MST instance priority with the
command spanning-tree mst 0 prioritypriority. Which two numbers can be
used for the priority argument? (Choose two.)
https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 25/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

2048
4096
6144
12288
18432

Explanation: In MST operation, the instance priority is a value between 0


and 61,440, in increments of 4096.

35. A network administrator is configuring MST on switch SW1 with the


commands:

SW1(config)# spanning-tree mode mst


SW1(config)# spanning-tree mst 12 root primary

What is the effect after the command is entered?

The bridge priority on switch SW1 is set to 32768 for MST instance 12.
The bridge priority on switch SW1 is set to 28672 for MST instance 12.
The bridge priority on switch SW1 is set to 20480 for MST instance 12.
The bridge priority on switch SW1 is set to 24576 for MST instance 12.

Explanation: In MST configuration, an MST instance priority can be defined



in one of two methods:
spanning-tree mst instance-number priority priority , where the priority is a
value between 0 and 61,440, in increments of 4096
spanning-tree mst instance-number root { primary | secondary }[ diameter

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 26/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

diameter ], where the primary keyword sets the priority to 24,576, and the
secondary keyword sets the priority to 28,672

36. Refer to the exhibit. A network administrator in autonomous system


65100 has set up a dual-homed BGP connection with an ISP. The
administrator would like to ensure that all traffic from the ISP enters the
autonomous system through the router R1. Which BGP attribute can the
administrator configure on routers R1 and R2 to accomplish this?

next-hop
weight

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 27/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

aggregate
multiple-exit discriminator
local preference

Explanation: The multiple-exit discriminator (MED) is a nontransitive BGP


attribute for best-path determination. MED uses a 32-bit value (0 to
4,294,967,295) called a metric. The purpose of MED is to influence traffic
flows inbound from a different AS. A lower MED is preferred over a higher
MED.

37. A technician is configuring the channel on a wireless router to either 1,


6, or 11. What is the purpose of adjusting the channel?

to avoid interference from nearby wireless devices


to disable broadcasting of the SSID
to enable different 802.11 standards
to provide stronger security modes

Explanation: Channels 1, 6, and 11 are selected because they are 5


channels apart. thus minimizing the interference with adjacent channels. A
channel frequency can interfere with channels on either side of the main
frequency. All wireless devices need to be used on nonadjacent channels.

38. Refer to the exhibit. The network administrator configures both switches
as displayed. However, host C is unable to ping host D and host E is unable
to ping host F. What action should the administrator take to enable this
communication?

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 28/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Configure either trunk port in the dynamic desirable mode.


Add the switchport nonegotiate command to the configuration of SW2.
Remove the native VLAN from the trunk.
Associate hosts A and B with VLAN 10 instead of VLAN 1.
Include a router in the topology.

Explanation: If one trunk port is in auto DTP negotiation mode, a trunk will
be formed if the adjacent switch port is placed in trunk or dynamic desirable 
mode.

39. What is a function of IGMP snooping?

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 29/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

updating static MAC entries on ports that should receive multicast traffic from
certain sources or groups
learning and maintaining multicast group memberships
restricting multicast packets for IP multicast groups that have downstream
receivers
updating receiver applications to filter out unwanted traffic

Explanation: IGMP snooping reduces multicast flooding on a LAN segment


by learning and maintaining multicast group memberships at the Layer 2
level.

40. Which OSPF packet type contains a summary of the link state database
and is sent by an OSPF router as it forms an adjacency with a neighboring
OSPF router?

hello
link-state ack
link-state update
database description

Explanation: After hello packets are exchanged, an OSPF router sends a


database description packet summarizing its link-state database to its
neighbors.

41. An administrator is configuring a pre-shared key for a WLAN


environment. The administrator wants to protect the WLAN against any
man-in-the-middle attacks occurring during the four-way handshake

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 30/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

between the client and the AP. Which WPA3-Personal method will provide
the best security?

Diffie-Hellman method
not authenticating against a server
RSA key
SAE method

Explanation: WPA3-Personal uses the Simultaneous Authentication of


Equals (SAE) method to strengthen the key exchange between the clients
and AP.

42. Which OSPF network type includes the DR/BDR field in OSPF Hello
packets and uses a 10 seconds hello and 40 seconds dead interval timer?

point-to-point
point-to-multipoint
broadcast
nonbroadcast

Explanation: The broadcast network type is the default for OSPF Ethernet
links and includes the DR/BDR field in hellp packets and uses a 10 seconds 
hello and 40 seconds dead interval.

43. What are two advantages of using multiple OSPF areas? (Choose two.)

They allow for unequal cost load balancing.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 31/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

The link-state database is a more manageable size.


They permit configuration of route summarization.
DR/BDR elections are not required.
All areas share an identical link-state database.

Explanation: There are several key advantages to using multiarea vs single


area OSPF:
Shortest path first (SPF) tree calculations are contained within an area when
a link flaps.
The LSDB is more manageable.
Summarization of route information can occur.

44. Which LSA type is sent by an OSPF DR to advertise attached


multiaccess network segments?

type 2
type 3
type 4
type 5

Explanation: An OSPF DR advertises attached multiaccess network


segments with the type 2 network LSA.

45. What are two characteristics of OSPF type 3 LSAs? (Choose two.)

They are originated by DRs and BDRs.


They are originated by ABRs.
They advertise specific networks that are external to the OSPF process

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 32/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

They advertise network prefixes from other areas.


They are contained within the originating area.

Explanation: Type 3 LSAs are originated by ABRs to advertise networks


learned from other areas.

46. A company is deploying a wireless network using lightweight APs. What


is an advantage of Layer 2 roaming compared with Layer 3 roaming when
wireless clients roam around the campus?

The process of Layer 2 roaming is faster.


A wireless client can keep the same IP address.
The roaming does not involve a WLC.
DHCP service is not required.

Explanation: Both Layer 2 and Layer 3 roams are intercontroller roaming. In


intercontroller roaming, a client roams from one AP to another AP that is
bound to a different WLC. If both APs are configured with the same VLAN
and IP address subnet, the client has made a Layer 2 intercontroller roam
and it stays on the same VLAN and subnet. The process of Layer 2 roaming
is faster than Layer 3 roaming (usually less than 20 ms). Both Layer 2

roaming and Layer 3 roaming allow the client to keep the same IP address.

47. How is ERSPAN used for troubleshooting?

to capture network traffic on a remote switch and send a copy of it to the local
switch through Layer 2 toward a local port attached to a traffic analyzer
https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 33/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

to capture network traffic on a switch port and send it to a VLAN


to capture network traffic on a remote device and send it to the local
system through Layer 3 toward a local port attached to a traffic analyzer
to capture local network traffic on a switch and send a copy of it to a local
port attached to a traffic analyzer

Explanation: Catalyst switches provide the Switched Port Analyzer (SPAN),


which makes it possible to capture packets by using the following techniques:
Local Switched Port Analyzer. Local network traffic is captured on a
switch and a copy of it is sent to a local port attached to a traffic
analyzer.
Remote Switched Port Analyzer (RSPAN). Network traffic is captured on
a remote switch and a copy of it is sent to the local switch through Layer
2 (switching) toward a local port attached to a traffic analyzer.
Encapsulated Remote Switched Port Analyzer (ERSPAN). Network
traffic is captured on a remote device and it is sent to the local system
through Layer 3 (routing) toward a local port attached to a traffic
analyzer.

48. Refer to the exhibit. Which zone-member security command keyword


will complete the ZBFW configuration when applied to the GigabitEthernet
0/2 interface? 

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 34/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

POLICY-SELF-TO-OUTSIDE
CLASS-SELF-TO-OUTSIDE-INSPECT
ACL-ICMP
OUTSIDE

Explanation: To complete the ZBFW configuration the zone-member


security OUTSIDE command must be issued to GigabitEthernet 0/2.


49. What is a limitation of PACLs?

They do not support outbound filtering.


They support only extended ACLs.
They can filter only Layer 2 traffic.
They support only numbered ACLs.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 35/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Explanation: PACLs have some limitations and restrictions. PACLs do not


support filtering of outbound traffic on an interface, and they do not support
ACLs to filter IPv6 traffic.

50. Match the Cisco SAFE security concepts with the description. (Not all
options are used.)

threat defense enables assessment of the nature and the potential risk of
suspicious activity

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 36/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

secure includes technologies such as access control, VPNs, and


services encryption

segmentation establishes boundaries for both data and user

51. An organization is deploying a network access security policy for end


point devices to access the campus network. The IT department has
configured multiple network access control mechanisms, such as 802.1x,
WebAuth, and MAB. WebAuth and MAB are configured as fallbacks to
802.1x. What is the authentication process when an employee brings a
laptop and connects to a switch on the network?

The switch will initiate authentication by WebAuth protocol. If it fails, the


switch will try 802.1x next, then MAB.
The switch will initiate authentication by 802.1x protocol. If it fails, the switch
will try WebAuth next, then MAB.
The switch will initiate authentication by 802.1x protocol. If it fails, the
switch will try MAB next, then WebAuth.
The switch will initiate authentication by MAB protocol. If it fails, the switch
will try 802.1x next, then WebAuth.

Explanation: When an organization deploys network access control, MAB 


and WebAuth can be used as a fallback authentication mechanism for
802.1x. If both MAB and WebAuth are configured as fallbacks for 802.1x,
when 802.1x times out, a switch first attempts to authenticate through MAB,
and if it fails, the switch attempts to authenticate with WebAuth.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 37/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

52. Refer to the exhibit. BGP sessions are established between all routers.
RTC receives route updates for network 209.165.200.224/27 from
autonomous system 300 with the weight attribute set to 3000. RTB also
learns about network 209.165.200.224/27 from autonomous system 200 with
a weight of 2000. Which router will be used by RTA as a next hop to reach
this network?

RTC because of the T1 link


RTB because of the slow 64 kbps link
RTB because of the shortest AS_Path
RTC because of the highest weight
RTC because of the longest AS_Path
RTB because of the lowest weight

Explanation: The BGP best-path algorithm uses attributes for the best-path
selection. The top 5 attributes, ranked in order of consideration, are the
following:
1. Weight.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 38/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

2. Local preference.
3. Local originated (network statement, redistribution, or aggregation).
4. AIGP.
5. Shortest AS_Path.
BGP weight is a Cisco-defined attribute and is a 16-bit value assigned locally
on the router; it is not advertised to other routers. Thus, the weight attributes
as specified in RTD and RTE have no effect in RTA for determining the best
outbound path. Assuming that the attributes in ranks 2 to 4 are not specified,
the shortest AS_Path attribute is used to choose the outbound path when
two paths are available.

53. A company plans to deploy the Postman application as a tool to manage


network devices. Which two security related best practices should be
considered? (Choose two.)

An SSH connection should be used to connect to the Postman application.


User accesses must be authenticated to make API calls.
A dedicated instance for development should be used to ensure that
device configurations are valid.
AAA service should be deployed for user authorization.
ACLs should be used to verify and filter different types of RUSTFul API calls.

Explanation: RESTful APIs are software interfaces into an application or a
controller. For security considerations, access to APIs should require
authentication such that an API is considered just like any other device to
which a user needs to authenticate to gain access to utilize the APIs. A
developer who is authenticated has access to making changes using the API,
https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 39/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

changes that can affect that application. It is best practice to use a dedicated
development instance of the application to test change codes to avoid
accidental impact to a production environment.

54. Which tool can be used to identify wireless RF signal strength and
interference?

WLAN controller
packet analyzer
packet sniffer
spectrum analyzer

Explanation: Spectrum analyzers are designed to detect and measure RF


energy that is present in those frequency ranges at 2.4 GHz and 5 GHz. A
spectrum analyzer takes RF radio information, whether it is from wireless
access points or other equipment using the free ISM band, and puts it into a
visible display format.

55. When JSON data format is being used, what characters are used to hold
objects?

double braces { }
double brackets [ ] 
double quotations ” “
double colons : :

Explanation: A JavaScript Object Notation (JSON) object is a key-value data

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 40/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

format that is typically rendered in curly braces { }.

56. What is a characteristic of PIM dense mode?

It relies on a unicast routing protocol to perform Reverse Path Check.


It is not recommended for production environments.
Prunes are sent out on all RPF interfaces.
Prunes are not sent out of non-RPF interfaces.

Explanation: Because Pim dense mode uses more bandwidth during its
periodic flood and prune behavior, it is not recommended for production
environments.

57. Which automation tool is agentless and uses playbooks to deploy


configuration changes or retrieve information from hosts within a network?

Ansible
Puppet
SaltStack
Chef

Explanation: Ansible is an agentless automation tool that uses playbooks to 


deploy configuration changes or retrieve information from hosts. The Ansible
playbook is a structured set of instructions used to enforce configuration and
deployment steps or to retrieve information from hosts.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 41/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

58. A network administrator is configuring the MST instance priority with the
command spanning-tree mst 0 priority priority . Which two numbers can be
used for the priority argument? (Choose two.)

2048
4096
6144
12288
18432

Explanation: In MST operation, the instance priority is a value between 0


and 61,440, in increments of 4096.

59. What is a requirement to configure a trunking EtherChannel between


two switches?

The participating interfaces must be on the same module on a switch.


The allowed range of VLANs must be the same on both switches.
The participating interfaces must be assigned the same VLAN number on
both switches.
The participating interfaces must be physically contiguous on a switch.

Explanation: To enable a trunking EtherChannel successfully, the range of 


VLANs allowed on all the interfaces must match; otherwise, the
EtherChannel cannot be formed. The interfaces involved in an EtherChannel
do not have to be physically contiguous, or on the same module. Because
the EtherChannel is a trunking one, participating interfaces are configured as
trunk mode, not access mode.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 42/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

60. Which three packet types are exchanged between EIGRP neighbors?
(Choose three.)

LSU
database descriptor
link-state ACK
hello
query
request

Explanation: There are five EIGRP packet types exchanged between


EIGRP routers:
Hello
Request
Update
Query
Reply

61. Refer to the exhibit. Which two statements describe the results of
entering these commands? (Choose two.)

R1 will send system messages of levels 0 (emergencies) to level 4


(warnings) to a server.
The syslog server has the IPv4 address 192.168.10.10.
https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 43/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

R1 will not send critical system messages to the server until the command
debug all is entered.
R1 will reset all the warnings to clear the log.
R1 will output the system messages to the local RAM.

Explanation: System messages of levels 0 (emergencies) through 4


(warnings) are sent to the syslog server at 192.168.10.10.

62. Refer to the exhibit. The total number of packet flows is not consistent
with what is expected by the network administrator. The results show only
half of the flows that are typically captured for the interface. Pings between
the router and the collector are successful. What is the reason for the
unexpected results?

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 44/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Interface Fa0/0 is not configured as the source of the packets sent to the
collector.
The interface is shutdown.
The Netflow collector IP address and UDP port number are not configured on
the router.
The router is not configured to monitor outgoing packets on the
interface. 

Explanation: NetFlow flows are unidirectional. One user connection exists


as two flows. The flow in each direction must be captured. This is done by
using both the ip flow ingress and ip flow egress command on the interface.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 45/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

63. Refer to the exhibit. Based on the output generated by the show monitor
session 1 command, how will SPAN operate on the switch?

All traffic transmitted from VLAN 10 or received on VLAN 20 is forwarded to


FastEthernet 0/1.
Native VLAN traffic received on VLAN 10 or transmitted from VLAN 20 is
forwarded to FastEthernet 0/1.
Native VLAN traffic transmitted from VLAN 10 or received on VLAN 20 is
forwarded to FastEthernet 0/1.
All traffic received on VLAN 10 or transmitted from VLAN 20 is
forwarded to FastEthernet 0/1.

Explanation: The show monitor session command is used to verify how
SPAN is configured (what ports are involved in the traffic mirroring).

64. Which two statements describe items to be considered in configuring


NetFlow? (Choose two.)
https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 46/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

NetFlow consumes additional memory.


Netflow requires UDP port 514 for notification messages.
NetFlow can only be used if all devices on the network support it.
Netflow requires both management and agent software.
Netflow can only be used in a unidirectional flow.

Explanation: NetFlow consumes additional memory to accommodate the


data stored in cache. The collector must have adequate RAM and hard disk
space to support NetFlow. Two individual flows exist for each user
connection. All devices are not required to support NetFlow. Data can be
collected from devices that do support it.

65. Which three statements describe SPAN and RSPAN? (Choose three.)

SPAN can send a copy of traffic to a port on another switch.


SPAN can be configured to send a copy of traffic to a destination port
on the same switch.
RSPAN is required to copy traffic on a source VLAN to a destination port on
the same switch.
RSPAN can be used to forward traffic to reach an IPS that is analyzing
traffic for malicious behavior.
RSPAN is required for syslog and SNMP implementation. 
SPAN can copy traffic on a source port or source VLAN to a destination
port on the same switch.

Explanation: The Switched Port Analyzer (SPAN) feature on Cisco switches


is a type of port mirroring that sends copies of the frame entering a source
https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 47/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

port (or VLAN), out another port on the same switch. Typically the destination
port is attached with a packet sniffer or IPS device. Remote SPAN (RSPAN)
allows source and destination ports to be in different switches.

66. Refer to the exhibit. A network administrator is configuring BGP on the


router RT1. Which command set will allow RT1 to establish a neighbor
relationship with RT2?

RT1(config)# router bgp 65100


RT1(config-router)# network 128.107.0.0 mask 255.255.0.0
RT1(config-router)# neighbor 10.1.1.1 remote-as 65200

RT1(config)# router bgp 65100
RT1(config-router)# network 128.107.0.0 mask 255.255.0.0
RT1(config-router)# neighbor 192.168.2.2 remote-as 65200

RT1(config)# router bgp 65100


RT1(config-router)# network 128.107.0.0 mask 255.255.0.0

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 48/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

RT1(config-router)# neighbor 10.1.1.2 remote-as 65200

RT1(config)# router bgp 65200


RT1(config-router)# network 64.104.0.0 mask 255.255.0.0
RT1(config-router)# neighbor 10.1.1.2 remote-as 65100

Explanation: The basic BGP configuration steps include the following:


Initialize the BGP routing process with the global command router bgp as-
number .
Identify the IP address and autonomous system number associated with a
BGP neighbor by the BGP router configuration command neighbor ip-
address remote-as as-number .
Identify the specific network prefixes to be installed into the BGP table with
the network statements.

67. A large shopping mall is planning to deploy a wireless network for


customers. The network will use a lightweight AP topology. The network
designers are considering the roaming by wireless clients. Which statement
describes a difference between Layer 2 roaming and Layer 3 roaming?

Layer 2 roaming occurs between two APs configured with the same
VLAN and IP subnet, whereas Layer 3 roaming occurs between two APs 
configured with different VLANs and IP subnets.
Layer 2 roaming does not require the client to contact a DHCP server,
whereas Layer 3 roaming requires the client to contact a DHCP server.
Layer 2 roaming does not require communicating to a WLC through
CAPWAP, whereas Layer 3 roaming does.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 49/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Layer 2 roaming occurs between two APs that are bound to the same WLC,
whereas Layer 3 roaming occurs between two APs that are bound to different
WLCs.

Explanation: Both Layer 2 and Layer 3 roams are intercontroller roaming. In


intercontroller roaming, a client roams from one AP to another AP that is
bound to a different WLC. An AP communicates to the bounding WLC
through a CAPWAP tunnel. If the two APs involved in an intercontroller
roaming are configured with the same VLAN and IP subnet, Layer 2 roaming
occurs. If they are configured with different VLANs and IP subnets, a Layer 3
roaming occurs.

68. Which two types of probes can be configured to monitor traffic by IP


SLA within a network environment? (Choose two.)

voice quality scores


website upload time
SNMP traps
packet loss
syslog messages

Explanation: IP SLA is a tool that allows for the continuous monitoring of


various aspects of the network. Different types of probes can be configured

to monitor traffic within a network environment:
Delay
Jitter (directional)
Packet loss (directional)
Packet sequencing (packet ordering)
https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 50/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Path (per hop)


Connectivity (directional)
Server or website download time
Voice quality scores

69. What is the function of the Diffie-Hellman algorithm within the IPsec
framework?

provides strong data encryption


guarantees message integrity
allows peers to exchange shared keys
provides authentication

Explanation: The IPsec framework uses various protocols and algorithms to


provide data confidentiality, data integrity, authentication, and secure key
exchange. DH (Diffie-Hellman) is an algorithm used for key exchange. DH is
a public key exchange method that allows two IPsec peers to establish a
shared secret key over an insecure channel.

70. Refer to the exhibit. Which IP address would be configured on the tunnel
interface of the destination router?

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 51/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

209.165.200.226
172.16.1.1
172.16.1.2
209.165.200.225

Explanation: The IP address that is assigned to the tunnel interface on the


local router is 172.16.1.1 with a prefix mask of /30. The only other address,
172.16.1.2, would be the destination tunnel interface IP address. Although
209.165.200.226 is listed as a destination address in the output, this is the
address of the physical interface at the destination, not the tunnel interface.

71. What is the purpose of the generic routing encapsulation tunneling
protocol?

to provide fixed flow-control mechanisms with IP tunneling between remote


sites

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 52/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

to support basic unencrypted IP tunneling using multivendor routers between


remote sites
to manage the transportation of IP multicast and multiprotocol traffic
between remote sites
to provide packet level encryption of IP traffic between remote sites

Explanation: The GRE tunneling protocol is Cisco proprietary and does not
include any flow-control mechanisms by default. GRE does not support
encryption and is used to manage the transportation of IP multicast and
multiprotocol traffic.

72. Which three services are critical functions of the IPsec service? (Choose
three.)

accounting
data integrity
speed
authentication
authorization
confidentiality


Explanation: The acronym CIA provides three critical functions of the IPsec
service: confidentiality, integrity, and authentication. Speed, accounting, and
authorization are possible factors within the IPsec service but are not critical.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 53/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

73. Which three functions are provided by the syslog logging service?
(Choose three.)

gathering logging information


authenticating and encrypting data sent over the network
retaining captured messages on the router when a router is rebooted
specifying where captured information is stored
distinguishing between information to be captured and information to
be ignored
setting the size of the logging buffer

Explanation: Syslog operations include gathering information, selecting


which type of information to capture, and directing the captured information
to a storage location. The logging service stores messages in a logging
buffer that is time-limited, and cannot retain the information when a router is
rebooted. Syslog does not authenticate or encrypt messages.

74. What are two operational characteristics of the ZBFW default zone?
(Choose two.)

By default, interfaces in this zone are permitted to communicate with


interfaces of other security zones.
It includes interfaces that are not members of other security zones.

It is a system-built zone.
It includes all IP addresses on a router.
All traffic to and from this zone is permitted by default.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 54/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Explanation: The default zone is a system-level zone. If an interface is not


configured as part of another security zone, it is placed in the default zone
automatically.

75. Which password type uses a Cisco proprietary Vigenere cypher


encryption algorithm and is considered easy to crack?

type 5
type 7
type 8
type 9

Explanation: Type 7 passwords are considered insecure. They are


encrypted with a weak Vigenere cypher that is easily deciphered in seconds.

76. Which threat protection capability is provided by Cisco ESA?

web filtering
cloud access security
spam protection
Layer 4 traffic monitoring

Explanation: Email is a top attack vector for security breaches. Cisco ESA
includes many threat protection capabilities for email such as spam
protection, forged email detection, and Cisco advanced phishing protection.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 55/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

77. Which industry standard provides for port-based network access


control?

802.1Q
RADIUS
LISP
802.1x

Explanation: 802.1x is an industry standard for providing port-based


network access control. It provides a mechanism to authenticate devices
onto local-area networks and WLANs.

78. Refer to the exhibit. A network administrator configures AAA


authentication on R1. When the administrator tests the configuration by
telneting to R1 and no ACS servers can be contacted, which password
should the administrator use in order to login successfully?

authen-radius
LetMe1n2
Pa$$w0rD

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 56/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

authen-tacacs

Explanation: The authentication for Telnet connections is defined by AAA


method list AUTHEN. The AUTHEN list defines that the first authentication
method is through an ACS server using the RADIUS protocol (or RADIUS
server). If the RADIUS server cannot be contacted, the second
authentication method is to use the local user database. In this scenario, the
local user database is used with a username of ADMIN and a password of
Pa$$w0rD.

79. What is the one major difference between local AAA authentication and
using the login local command when configuring device access
authentication?

The login local command requires the administrator to manually configure the
usernames and passwords, but local AAA authentication does not.
Local AAA authentication allows more than one user account to be
configured, but login local does not.
Local AAA authentication provides a way to configure backup methods
of authentication, but login local does not.
The login local command uses local usernames and passwords stored on the
router, but local AAA authentication does not. 

Explanation: Local AAA authentication works very similar to the login local
command, except that it allows you to specify backup authentication methods

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 57/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

as well. Both methods require that local usernames and passwords be


manually configured on the router.

80. Refer to the exhibit. The ACL statement is the only one explicitly
configured on the router. Based on this information, which two conclusions
can be drawn regarding remote access network connections? (Choose two.)

SSH connections from the 192.168.2.0/24 network to the 192.168.1.0/24


network are allowed.
SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24
network are allowed.
Telnet connections from the 192.168.2.0/24 network to the 192.168.1.0/24
network are allowed.
SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24
network are blocked.
Telnet connections from the 192.168.1.0/24 network to the
192.168.2.0/24 network are blocked.
Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24
network are allowed.

Explanation: The extended access list in the exhibit is permitting SSH (TCP
port 22) traffic that is sourced from the 192.168.1.0/24 network and traveling
to the 192.168.2.0/24 network. The packets meeting this criteria are logged
to the local logging buffer (the default), a syslog server, or both depending on

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 58/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

how the router is configured for syslog settings. All other traffic is denied
because of the implicit deny at the end of every ACL.

81. Consider the configured access list.

R1# show access-lists


extended IP access list 100
deny tcp host 10.1.1.2 host 10.1.1.1 eq telnet
deny tcp host 10.1.2.2 host 10.1.2.1 eq telnet
permit ip any any (15 matches)

What are two characteristics of this access list? (Choose two.)

The 10.1.2.1 device is not allowed to telnet to the 10.1.2.2 device.


The access list has been applied to an interface.
Any device can telnet to the 10.1.2.1 device.
A network administrator would not be able to tell if the access list has been
applied to an interface or not.
Only the 10.1.1.2 device can telnet to the router that has the 10.1.1.1 IP
address assigned.
Any device on the 10.1.1.0/24 network (except the 10.1.1.2 device) can
telnet to the router that has the IP address 10.1.1.1 assigned.

Explanation: The access list stops Telnet traffic from the 10.1.1.2 device to
the 10.1.1.1 device. It also stops Telnet traffic from 10.1.2.2 device to
10.1.2.1. All other TCP/IP-based transmissions are allowed. The access list
is working because there have been 15 matches on the last ACE.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 59/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

82. Refer to the exhibit. An extended access list has been created to prevent
human resource users from gaining access to the accounting server. All
other network traffic is to be permitted. When following the ACL
configuration guidelines, on which router, interface, and direction should
the access list be applied?

router R1, interface S0/1/0, outbound


router R2, interface Gi0/0/1, outbound
router R2, interface Gi0/0/1, inbound
router R1, interface Gi0/0/0, inbound
router R2, interface S0/1/1, inbound
router R1, interface Gi0/0/0, outbound

Explanation: The ACL configuration guidelines recommend placing


extended access control lists as close to the source of network traffic as

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 60/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

possible and placing standard access control lists as close to the destination
of network traffic as possible.

83. Refer to the exhibit. Which data format is used to represent the data for
network automation applications?

XML
YAML
HTML
JSON

Explanation: The common data formats that are used in many applications
including network automation and programmability are as follows:
JavaScript Object Notation (JSON) – In JSON, the data known as an object 
is one or more key/value pairs enclosed in braces { }. Keys must be strings
within double quotation marks ” “. Keys and values are separated by a colon.
eXtensible Markup Language (XML) – In XML, the data is enclosed within a
related set of tags data.
YAML Ain’t Markup Language (YAML) – In YAML, the data known as an

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 61/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

object is one or more key value pairs. Key value pairs are separated by a
colon without the use of quotation marks. YAML uses indentation to define its
structure, without the use of brackets or commas.

84. Which Python function is used for console output?

for
from
print
return

Explanation: The print command is used for console output. The command
for is used for repetition logic , from is used for module importing, and return
is a function definition.

85. What are two characteristics of the Python programming language?


(Choose two.)

It only runs in the interactive mode.


It requires a compiler to be installed.
The code is easy to read.
It runs without conversion to machine-language.
It uses the & symbol to indicate that the interactive mode is ready to accept 
commands.

Explanation: A compiled computer language is a computer language that


compiles its programs into a set of machine-language instructions, whereas

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 62/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

an interpreted programming language allows for an interpretation of the


instructions directly without first compiling them into machine language.

86. What term is used to describe the files that contain Python definitions
and statements?

function
file
module
script

Explanation: A module is a file containing Python definitions and statements.

87. Which characteristic is common to both Chef and Puppet?

Both function in a peer-to-peer model.


Both use the push model for configuration management.
Both have free open source versions.
Both are Cisco proprietary.

Explanation: Chef and Puppet have several similarities, to include:


Both have free open source versions available. 
Both have paid enterprise versions available.
Both manage code that needs to be updated and stored.
Both manage devices or nodes to be configured.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 63/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Both leverage a pull model.


Both function as a client/server model.

88. Question as presented: Match the automation tool to the architecture


components.

server and clients


masters and agents
control station and remote hosts
https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 64/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

salt master and minions

89. Which data format is expected by Cisco DNA Center for all incoming
data from the REST API?

YAML
HTTP
JSON
XML

Explanation: The Cisco DNA Center controller expects all incoming data
from the REST API to be in JSON format.

90. Which three orchestration tools require agent software on client


machines to be managed? (Choose three.)

Chef
Ansible
EEM
Puppet Bolt
SaltStack
Puppet

Explanation: There are several available agent based configuration and
automation tools, including Puppet, Chef, and SaltStack. Ansible, Puppet
Bolt, and EEM are agentless tools.

91. Which three are components of puppet modules? (Choose three.)


https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 65/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

files
recipes
manifests
pillars
playbooks
templates

Explanation: Puppet is a configuration management and automation tool


that uses modules to support the configuration of most devices that can be
configured manually. Puppet modules contain three components: Manifests,
templates, and files.

92. What are the key difference between a type 1 hypervisor and a type 2
hypervisor?

A type 1 hypervisor runs on specialized systems and a type 2 hypervisor runs


on desktop computers.
A type 1 hypervisor runs directly on the system hardware and a type 2
hypervisor requieres a host OS to run.
A type 1 hypervisor supports all server OS virtualization and a type 2
hypervisor supports Linux and Mac virtualization.
A type 1 hypervisor supports server virtualization and a type 2 hypervisor
supports workstation virtualization. 
93. A network administrator issues the show bgp ipv4 unicast summary
command to verify BGP session after basic BGP configuration is
completed. Which three pieces of information are found in the BGP session
summary? (Chose three.)

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 66/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

the number of exchanged prefixes with a neighbor


the BGP router ID of peers
the routes that are redistributed into BGP
the peer synchronization configuration
the AS number of the peer
the IGP that is configured on the BGP peer

94. A network administrator uses the spanning-tree portfast bpduguard


default global configuration command to enable BPDU guard on switch.
However, BPDU guard is not activated on all access ports. What is the
couse of the issue?

BPDU guard needs to be activated on the interface configuration command


mode.
PortFast is not configured on all access ports.
Access ports configured with root guard cannot be configured with BPDU
GURAD.
Access ports belong to different VLANs.

Explanation: BPDU guard can be enabled globally on all PortFast-enabled


ports by using the spanning-tree portfast bpduguard default global
configuration command. If PortFast is not configured, then BPDU guard is
not activated.

95. What is the key difference between a type 1 hypervisor and a type 2
hypervisor?

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 67/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

A type 1 hypervisor supports all server OS virtualization and a type 2


hypervisor supports Linux and Mac virtualization.
A type 1 hypervisor runs directly on the system hardware and a type 2
hypervisor requires a host OS to run.
A type 1 hypervisor runs on specialized systems and a type 2 hypervisor runs
on desktop computers.
A type 1 hypervisor supports server virtualizations and a type 2 hypervisor
only supports workstation virtualization.

Explanation: There are two types of hypervisors:


Type 1 – This type of hypervisor runs directly on the system hardware.
Type 2 – This type of hypervisor requires a host OS to run.

Both types of hypervisors can run on regular computer systems and support
multiple OS virtualizations.

96. A network administrator issues the show bgp ipv4 unicast summary
command to verify the BGP session after basic BGP configuration is
completed. Which three pieces of information are found in the BGP session
summary? (Choose three.)

the routes that are redistributed into BGP


the IGP that is configured on the BGP peer
the number of exchanged prefixes with a neighbor

the AS number of the peer
the peer synchronization configuration
the BGP router ID of the peers

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 68/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Explanation: The BGP session summary report includes information as


follows:
Neighbor – the IP address of the BGP peer
V – the BGP version spoken by the BGP peer
AS – the autonomous system number of the BGP peer
MsgRcvd – the count of messages received from the BGP peer
MsgSent – the count of messages sent to the BGP peer
TblVer – the last version of the BGP database sent to the peer
InQ – the number of messages queued to be processed by the peer
OutQ – the number of messages queued to be sent to the peer
Up/Down – the length of time the BGP session is established or the
current status if the session is not in an established state
State/PfxRcd – the current state of the BGP peer or the number of
prefixes received from the peer

97. Refer to the exhibit. A network administrator issues the show bgp ipv4
unicast | begin Network command to check the routes in the BGP table.
What does the symbol ? at the end of a route indicate?

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 69/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

The route is learned through a static route.


The route is originated from a connected network to the router.
The route is redistributed into BGP.
The route is the best route for the network prefix

Explanation: The origin is a well-known mandatory BGP path attribute used


in the BGP best-path algorithm. A value of i represents an IGP, e indicates
EGP, and ? indicates a route that was redistributed into BGP.

98. Which two OSPFv3 LSA types are used to advertise IPv6 prefixes to
neighbors? (Choose two.)

LSA type 4 – interarea router


LSA type 5 – AS-external 
LSA type 7 – NSSA
LSA type 8 – link-local LSA
LSA type 9 – intra-area prefix LSA

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 70/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Explanation: Two new LSA types are added to OSPFv3, type 8, link-local
LSA, and type 9, intra-area prefix LSA. These two LSAs advertise unicast
prefixes and prevent the need for OSPF calculations when interface
addresses are added or changed.

99. Refer to the exhibit. Spanning-tree port priorities are listed beneath each
interface. The network administrator enters the spanning-tree vlan 1 root
primary command on S4. What is the effect of the command?

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 71/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Port priority makes Gi0/2 on S1 a root port.


S3 Gi0/2 transitions from designated port to root port because of path
cost changes caused by the root change.
Spanning tree blocks Gi0/1 on S3 to prevent a redundant path from S1. 
S4 is already the root bridge, so there are no port changes.
S2 Gi0/1 becomes a nondesignated port because Gi0/2 has a lower path
cost to S4.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 72/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

Explanation: According to the exhibit, S1 is the root bridge. After


the spanning-tree vlan 1 root primary command on S4 is issued, S4
becomes the root bridge, because S4 priority is modified to 24576 and the
MAC address is lower than the MAC address of S1. This causes S3 Gi0/2
port to transition from designated port to root port because of path cost
changes caused by this root change.

100. Refer to the exhibit. A network administrator is configuring an


EtherChannel link between two switches, SW1 and SW2. Which statement
describes the effect after the commands are issued on SW1 and SW2?

The EtherChannel is established after SW2 initiates the link request.


The EtherChannel is established after SW1 initiates the link request.
The EtherChannel is established without negotiation.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 73/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

The EtherChannel fails to establish.

Explanation: The interfaces GigabitEthernet 0/1 and GigabitEthernet 0/2 are


configured “on” for the EtherChannel link. This mode forces the interface to
channel without PAgP or LACP. The EtherChannel will be established only if
the other side is also set to “on”. However, the mode on SW2 side is set to
PAgP desirable. Thus the EtherChannel link will not be established.

← Previous Article Next Article →


CCNPv8 ENCOR (Version 8.0) – 9.1.2 Lab – Implement Multi-Area
FINAL EXAM Answers OSPFv2 (Answers)

Discover more Ethernet switch Routed Computer configuration

communicating
Discover more routers Routing Routed Configuration

 Subscribe 

Join the discussion

{} [+] 

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 74/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

13 COMMENTS

Anonymous  6 months ago

Is this valid as of 03/2025?

Reply

Anonymous1  6 months ago

 Reply to Anonymous
The same question???

Reply

Mostafa  10 months ago

A network administrator is configuring the MST instance priority with the


command spanning-tree mst 0 priority. Which two numbers can be used for
theargument? (Choose two.)

6144

4096

2048

18432

12288

Reply

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 75/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

IT Administrator  10 months ago

 Reply to Mostafa
Author
The correct answer is: 4096 and 12288.
Thanks for sharing.

Reply

Bryan Elskar  2 years ago

Has anybody used this recently?

Reply

Bryan Elskar  2 years ago

 Reply to Bryan Elskar


I ask because I notice it’s no longer in the main menu anymore, but it
appears to still be getting updated?

Reply

Student  4 years ago

Which two OSPFv3 LSA types are used to advertise IPv6 prefixes to
neighbors? (Choose two.) 
LSA type 4 – interarea router
LSA type 5 – AS-external
LSA type 7 – NSSA
LSA type 8 – link-local LSA

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 76/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

LSA type 9 – intra-area prefix LSA

Reply

IT Administrator  4 years ago

 Reply to Student
Author
Thanks for sharing!

Reply

Ady Das  4 years ago

Can anyone please tell me the difference between ccnp v8 & encor 350-
401?

Reply

Jojora  4 years ago

What are the key difference between a type 1 hypervisor and a type 2
hypervisor?

– A type 1 hypervisor runs on specialized systems and a type 2 hypervisor
runs on desktop computers.
– A type 1 hypervisor runs directly on the system hardware and a type 2
hypervisor requieres a host OS to run. (correct one)
– A type 1 hypervisor supports all server OS virtualization and a type 2
hypervisor supports Linux and Mac virtualization.

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 77/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

– A type 1 hypervisor supports server virtualization and a type 2 hypervisor


supports workstation virtualization.

Reply

IT Administrator  4 years ago

 Reply to Jojora
Author
Added all, thanks for your sharing!!

Reply

donaldduck  4 years ago

A network administrator issues the show bgp ipv4 unicast summary


command to verify BGP session after basic BGP configuration is completed.
Which three pieces of information are found in the BGP session summary?
(Chose three.)
o the number of exchanged prefixes with a neighbor (THIS)
o the BGP router ID of peers (THIS)
o the routes that are redistributed into BGP
o the peer synchronization configuration
o the AS number of the peer (THIS)
o the IGP that is configured on the BGP peer

Reply

roberto  4 years ago

A network administrator uses the spanning-tree portfast bpduguard default


global configuration command to enable BPDU guard on switch. However,

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 78/79
10/22/25, 3:39 PM CCNP ENCOR v8 Certification Practice Exam Answers

BPDU guard is not activated on all access ports. What is the couse of the
issue?
x BPDU guard needs to be activated on the interface configuration
command mode.
x PortFast is not configured on all access ports. (CORRECT)
x Access ports configured with root guard cannot be configured with BPDU
GURAD.
X Access ports belong to different VLANs.

Reply

ITExamAnswers.net Copyright © 2025. Privacy Policy


Contact
Cookie Settings

https://itexamanswers.net/ccnp-encor-v8-certification-practice-exam-answers.html 79/79

You might also like