Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Cisco 350-401 Dumps Questions Answers

Page: 1 / 14
Total 361 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Options:

Buy Now
Question 2

Options:

Question 3

Options:

Question 4

Options:

Question 5

Options:

Question 6

OR

Options:

Question 7

Options:

Question 8

Options:

Question 9

Options:

Question 10

Options:

Question 11

Options:

Question 12

Options:

Question 13

Options:

Question 14

Options:

Question 15

Options:

Question 16

Options:

Question 17

Options:

Question 18

Options:

Question 19

Options:

Question 20

Options:

Question 21

Options:

Question 22

Options:

Question 23

Options:

Question 24

Options:

Question 25

Options:

Question 26

Options:

Question 27

Options:

Question 28

Options:

Question 29

Options:

Question 30

What does the statement print(format(0.8, \0%')) display?

Options:

A.

80%

B.

8.8%

C.

.08%

D.

8%

Question 31

Which technology is the Cisco SD-Access control plane based on?

Options:

A.

LISP

B.

CTS

C.

SGT

D.

VRF

Question 32

Which language defines the structure or modelling of data for NETCONF and RESTCONF?

Options:

A.

JSON

B.

YANG

C.

XML

D.

YAML

Question 33

Refer to the exhibit. What is the value of the variable list after the code is run?

Options:

A.

[1,2.1.2.1,2]

B.

[1,2] * 3

C.

[3,6]

D.

[1,2]. [1.2]. [1,2]

Question 34

How do FHRPs differ from SSO?

Options:

A.

FHRPs provide gateway redundancy, and SSO provides failover within a single device

B.

FHRPs maintain state information within a single device, and SSO manages state information across multiple devices.

C.

FHRPs use OTV for redundancy, and SSO uses VXLAN for state synchronization.

D.

FHRPs influence bandwidth allocation, and SSO influences routing decisions.

Question 35

Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)

Options:

A.

integrated intrusion prevention

B.

VPN

C.

application-level inspection

D.

stateful packet inspection

E.

NAT

Question 36

Reler to the exhibit. An engineer configuring WebAuth on a Cisco Catalyst 9000 Series WIC. The engineer has purchased a third-party certificate using the FQDN of the WLC as the CN and intends to use bit on the WebAuth splash page What must be configured so that the clients do not receive a certificate error?

Options:

A.

Virtual IPv4 Address must be set to a routable address.

B.

Virtual IPv4 Hostname must match the CN of the certificate.

C.

Trustpoint must be set to the management certificate of the WLC.

D.

Web Auth Intercept HTTPs must be enabled.

Question 37

Exhibit.

Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?

Options:

A.

line vty 0 15

absolute-timeout 600

B.

line vty 0 15

exec-timeout

C.

line vty 01 5

exec-timeout 10 0

D.

line vty 0 4

exec-timeout 600

Question 38

What is one characteristic of an AP that is operating in Mobility Express mode?

Options:

A.

It is recommended for large scale deployments.

B.

It requires a centralized WLC.

C.

At least three APs are needed for WLC redundancy.

D.

It requires an AP to act as a WLC.

Question 39

When deploying a Cisco Unified Wireless solution what is a design justification for using a distributed WLC deployment model?

Options:

A.

It reduces the number of WLCs that network administrators must support by locating them in a common location

B.

It more evenly distributes MAC ARP and ND processing over multiple switches which helps with scalability

C.

The number of wireless clients is low and the size of the physical campus is small

D.

There are no latency concerns about LWAPP and CAPWAP tunnels traversing the campus core network

Question 40

A customer has two Cisco WLCs that manage separate APs throughout a building. Each WLC advertises the same SSID but terminates on different interfaces. Users report that they drop their connections and change IP addresses when roaming. Which action resolves this issue?

Options:

A.

Enable client load balancing

B.

Enable fast roaming.

C.

Configure high availability.

D.

Configure mobility groups.

Question 41

Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.

Options:

Question 42

Which method ensures the confidentiality of data exchanged over a REST API?

Options:

A.

Use TLS to secure the underlying HTTP session.

B.

Use me POST method Instead or URL-encoded GET to pass parameters.

C.

Deploy digest-based authentication to protect the access to the API.

D.

Encode sensitive data using Base64 encoding.

Question 43

What is a client considered when it is in web authentication state and roams between two controllers with mobility tunnels?

Options:

A.

anchor

B.

mobile

C.

foreign

D.

new

Question 44

What is one method for achieving REST API security?

Options:

A.

using a MD5 hash to verify the integrity

B.

using built-in protocols known as Web Services Security

C.

using HTTPS and TLS encryption

D.

using a combination of XML encryption and XML signatures

Question 45

What is a TLOC in a Cisco Catalyst SD-WAN deployment?

Options:

A.

component set by the administrator to differentiate similar nodes that offer a common service

B.

value that identifies a specific tunnel within the Cisco Catalyst SD-WAN overlay

C.

identifier that represents a specific service offered by nodes within the Cisco Catalyst SD-WAN overlay

D.

attribute that acts as a next hop for network prefixes

Question 46

Refer to the exibit. How should the programmer access the list of VLANs that are recevied via the API call?

Options:

A.

VlanNames(0)

B.

VlanName[Vlan1']

C.

VlanName['response']

D.

list(VlanNames)

Question 47

An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?

event manager applet LogMessage

event routing network 172.30.197.0/24 type all

Options:

A.

action 1 syslog send "OSPF ROUTING ERROR"

B.

action 1 syslog pattern "OSPF ROUTING ERROR"

C.

action 1 syslog write "OSPF ROUTING ERROR"

D.

action 1 syslog msg "OSPF ROUTING ERROR"

Question 48

What happens when a FlexConnect AP changes to standalone mode?

Options:

A.

All client roaming continues to work.

B.

All controller-dependent activities stop working except the DFS.

C.

Only clients on central switching WLANs stay connected.

D.

All clients on all WLANs are disconnected.

Question 49

Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two.)

Options:

A.

custom headers

B.

authentication

C.

authorization

D.

request management

E.

accounting

Question 50

What is a characteristic of Layer 3 roaming?

Options:

A.

Clients must obtain a new IP address when they roam between APs.

B.

It provides seamless roaming between APs that are connected to different Layer 3 networks and different mobility groups.

C.

It is only supported on controllers that run SSO.

D.

It provides seamless client roaming between APs in different Layer 3 networks but within the same mobility group.

Question 51

Refer to lhe exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF-capable CiscoIOSXE device that Is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 52

Refer to the exhibit.

An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?

Options:

A.

B.

C.

D.

Question 53

Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used

Options:

Question 54

What is contained in the VXLAN header?

Options:

A.

original Layer 2 VLAN ID

B.

Endpoint ID

C.

VXLAN network identifier

D.

source and destination RLOC ID

Page: 1 / 14
Total 361 questions