Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Cisco 350-401 Dumps Questions Answers

Page: 1 / 15
Total 393 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Options:

Buy Now
Question 2

Options:

Question 3

Options:

Question 4

Options:

Question 5

Options:

Question 6

Options:

Question 7

Options:

Question 8

Options:

Question 9

OR

Options:

Question 10

Options:

Question 11

Options:

Question 12

Options:

Question 13

Options:

Question 14

Options:

Question 15

Options:

Question 16

Options:

Question 17

Options:

Question 18

Options:

Question 19

Options:

Question 20

Options:

Question 21

Options:

Question 22

Options:

Question 23

Options:

Question 24

Options:

Question 25

Options:

Question 26

Options:

Question 27

Options:

Question 28

Options:

Question 29

Options:

Question 30

Refer to the exhibit. Which python code snippet prints the descriptions of disabled interface only?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 31

Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.

Options:

A.

action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file"

B.

action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file"

C.

action 4.0 ens-event "show process cpu sorted | append flash:high-cpu-file"

D.

action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file"

Question 32

Which two components are needed when a Cisco SD-Access fabric is designed? (Choose two.)

Options:

A.

Cisco Catalyst Center (formerly DNA Center) application

B.

Firepower Threat Defense

C.

Identity Service Engine

D.

Cisco Data Center Network Manager

E.

Cisco Prime Infrastructure

Question 33

Which AP mode allows an engineer to scan configured channels for rogue access points?

Options:

A.

sniffer

B.

monitor

C.

bridge

D.

local

Question 34

Which mechanism is used to protect the confidentiality of sensitive information exchanged over REST APIs?

Options:

A.

TLS

B.

802.1X

C.

SSH

D.

IPsec

Question 35

Refer to the exhibit. How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 36

Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors?

Options:

A.

Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes.

B.

Each virtual machine requires a unique IP address but shares the MAC address with the physical server

C.

Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server.

D.

Each virtual machine requires a unique MAC address but shares the IP address with the physical server.

Question 37

An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?

Options:

A.

EAP-TLS

B.

EAP-FAST

C.

LDAP

D.

PEAP

Question 38

Refer to the exhibit.

Which JSON syntax is derived from this data?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 39

Which authorization framework gives third-party applications limited access to HTTP services?

Options:

A.

IPsec

B.

GRE

C.

Basic Auth

D.

OAuth 2.0

Question 40

How do FHRPs differ from SSO?

Options:

A.

FHRPs provide gateway redundancy, and SSO provides failover within a single device

B.

FHRPs maintain state information within a single device, and SSO manages state information across multiple devices.

C.

FHRPs use OTV for redundancy, and SSO uses VXLAN for state synchronization.

D.

FHRPs influence bandwidth allocation, and SSO influences routing decisions.

Question 41

Refer to lhe exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF-capable CiscoIOSXE device that Is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 42

What is a characteristic of VXLAN?

Options:

A.

It extends Layers 2 and Layer 3 overlay network over a Layer 2 underly.

B.

It has a 12-byte packet header.

C.

Its frame encapsulation is performed by MAC-in-UDP.

D.

It uses TCP for transport

Question 43

Which method does FastLocate use to collect location-based information?

Options:

A.

RFID

B.

client probing

C.

beacons

D.

data packets

Question 44

Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used.

Options:

Question 45

Refer to the exhibit. Which configuration causes the traffic from PC-1 to the internet to use the link between CoreSW-1 and CoreSW-2 when both switches are up?

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 46

Which A record type should be configured for access points to resolve the IP address of a wireless LAN controller using DNS?

Options:

A.

CISCO.CONTROLLER.Iocaldomain

B.

CISCO.CAPWARCONTROLLERJocaldomain

C.

CISCO-CONTROLLER.Iocaldomain

D.

CISCO-CAPWAP-CONTROLLER.Iocaldomain

Question 47

Drag and drop the threat defense solutions from the left onto their descriptions on the right.

Options:

Question 48

Which new security enhancement is introduced by deploying a next-generation firewall at the data center in addition to the Internet edge?

Options:

A.

virtual private network for remote access

B.

DDoS protection

C.

firewall protection of the east-west traffic at the data center

D.

firewall protection of the south-north traffic at the data center

Question 49

Drag and drop the characteristics of PIM Sparse Mode from the left to the right. Not all options are used.

Options:

Question 50

What is the name of the numerical relationship of the wireless signal compared to the noise floor?

Options:

A.

SNR

B.

RSSI

C.

EIRP

D.

gain

Question 51

What is a capability of the Cisco DNA Center southbound API?

Options:

A.

It connects 1o ITSM services such as ServiceNow.

B.

It allows administrators to make API calls to Cisco DNA Center.

C.

It sends webhooks from Cisco DNA Center when alerts are triggered

D.

It adds support for managing non-Cisco devices from Cisco DNA Center.

Question 52

A customer requires their wireless data traffic to egress at the switch port of the access point. Which access point mode supports this?

Options:

A.

Bridge

B.

Sniffer

C.

FlexConnect

D.

Monitor

Question 53

A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violates Which term refers to this REST security design principle?

Options:

A.

economy of mechanism

B.

complete mediation

C.

separation of privilege

D.

least common mechanism

Question 54

A script contains the statement •white loop != 999 ’ Which value terminates the loop?

Options:

A.

A value equal to 999.

B.

A value not equal to 999.

C.

A value greater than or equal to 999.

D.

A value less than or equal to 999.

Question 55

An engineer is reviewing a PCAP file that contains a packet capture of a four-way handshake exchange between a dient and AP using WPA2 Enterprise Which EAPOL message validates and confirms that the client device has successfully Installed the GTK?

Options:

A.

M4-Message

B.

M3-Message

C.

M2-Message

D.

M1-Message

Question 56

Drag and drop the snippets onto the blanks within the code to construct a script that blocks a MAC address.

Options:

Question 57

What is contained in the VXLAN header?

Options:

A.

original Layer 2 VLAN ID

B.

Endpoint ID

C.

VXLAN network identifier

D.

source and destination RLOC ID

Question 58

Why is a Type 1 hypervisor more efficient than a Type 2 hypervisor?

Options:

A.

Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques.

B.

Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS.

C.

Type 1 hypervisor enables other operating systems to run on it.

D.

Type 1 hypervisor relies on the existing OS of the host machine to access CPU, memory, storage, and network resources.

Question 59

A customer has two Cisco WLCs that manage separate APs throughout a building. Each WLC advertises the same SSID but terminates on different interfaces. Users report that they drop their connections and change IP addresses when roaming. Which action resolves this issue?

Options:

A.

Enable client load balancing

B.

Enable fast roaming.

C.

Configure high availability.

D.

Configure mobility groups.

Page: 1 / 15
Total 393 questions