Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Cisco 350-401 Dumps Questions Answers

Page: 1 / 17
Total 258 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

What is used to measure the total output energy of a Wi-Fi device?

Options:

A.

dBi

B.

EIRP

C.

mW

D.

dBm

Buy Now
Question 2

Which definition describes JWT in regard to REST API security?

Options:

A.

an encrypted JSON token that is used for authentication

B.

an encrypted JSON token that is used for authorization

C.

an encoded JSON token that is used to securely exchange information

D.

an encoded JSON token that is used for authentication

Question 3

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

Options:

A.

Cisco Firepower and FireSIGHT

B.

Cisco Stealth watch system

C.

Advanced Malware Protection

D.

Cisco Web Security Appliance

Question 4

Which framework is used for third-party authorization?

Options:

A.

API keys

B.

custom tokens

C.

OAuth

D.

SOAP

Question 5

Which characteristic applies to Cisco SD-Access?

Options:

A.

It uses dynamic routing the discover and provision access switches.

B.

It uses VXLAN for the control plane

C.

It uses VXLAN for the data plane

D.

It uses dynamic routing to discover and provision border switches

Question 6

Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 7

What is the purpose of data modeling languages?

Options:

A.

to describe a data schema convertible into any data encoding format

B.

to specify algorithms necessary to decode binary-encoded protocol data units

C.

to translate encoded data for interoperability between different CPU architectures

D.

to provide a framework to describe data flow patterns in networks

Question 8

An engineer must configure a new 6 Ghz only SSID on a cisco catalyst 9800 series WLC, with these requirements:

    Provide 802.11ax data rates for supported devices

    All users authenticate using a certificate

Which wireless layer 2 security mode meets the requirements?

Options:

A.

WPA2 Enterprise

B.

WPA3 Personal

C.

WPA2 Personal

D.

WPA3 Enterprise

Question 9

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

Options:

A.

A close up of a text AI-generated content may be incorrect.

B.

A close up of a logo AI-generated content may be incorrect.

C.

A close up of a text AI-generated content may be incorrect.

D.

A black text on a white background AI-generated content may be incorrect.

Question 10

How does NETCONF YANG represent data structures?

Options:

A.

as strict data structures defined by RFC 6020

B.

in an XML tree format

C.

In an HTML format

D.

as modules within a tree

Question 11

Refer to the exhibit. What is the output of this code?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 12

Drag and drop the snippets onto the blanks within the code to construct a script that blocks a MAC address.

Options:

Question 13

Refer to the exhibit. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?

Options:

A.

event manager applet EEM_IP_SLA

event track 10 state down

B.

event manager applet EEM_IP_SLA

event sla 10 state unreachable

C.

event manager applet EEM_IP_SLA

event sla 10 state down

D.

event manager applet EEM_IP_SLA

event track 10 state unreachable

Question 14

What are two methods of ensuring that the multicast RPF check passes without changing the unicast routing table? (Choose two.)

Options:

A.

disabling the interface of the router back to the multicast source

B.

implementing MBGP

C.

disabling BGP routing protocol

D.

implementing static mroutes

E.

implementing OSPF routing protocol

Question 15

What is a client who is using 802.1x for authentication referred to as?

Options:

A.

authenticator

B.

policy enforcement point

C.

NAC device

D.

supplicant

Question 16

Which three methods does Cisco Catalyst Center (formerly DNA Center) use to discover devices? (Choose three.)

Options:

A.

SNMP

B.

a specified range of IP addresses

C.

NETCONF

D.

LLDP

E.

ping

F.

CDP

Question 17

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

•LocationA -72dBm

• Location B:-75 dBm

• Location C; -65 dBm

• Location D -80 dBm

Which two statements does the engineer use to explain these values to the customer? (Choose two.)

Options:

A.

The signal strength at location B is 10 dB better than location C.

B.

The signal strength at location C is too weak to support web surfing

C.

Location D has the strongest RF signal strength.

D.

The RF signal strength at location B is 50% weaker than location A.

E.

The RF signal strength at location C is 10 times stronger than location B

Question 18

What is a characteristic of VXLAN?

Options:

A.

It extends Layers 2 and Layer 3 overlay network over a Layer 2 underly.

B.

It has a 12-byte packet header.

C.

Its frame encapsulation is performed by MAC-in-UDP.

D.

It uses TCP for transport

Question 19

Which language can be used to model configuration and state data?

Options:

A.

JSON

B.

XML

C.

XDR

D.

YANG

Question 20

Which deployment option of Cisco NGFW provides scalability?

Options:

A.

tap

B.

inline tap

C.

high availability

D.

clustering

Question 21

Which action controls the maximum cell size in a high-density wireless environment?

Options:

A.

Statically set TX power on access points to max.

B.

Disable low data rates.

C.

Set mandatory data rates.

D.

Decrease TX power on access points.

Question 22

Which protocol is used by vmanage to push centralized policies to vsmart controllers?

Options:

A.

NETCONF

B.

TLS

C.

STUN

D.

OMP

Question 23

Drag and drop the code snippets from the bottom onto the blanks in the Python script to convert a Python object into a JSON string. Not all options are used.

Options:

Question 24

Refer to the exhibit. An engineer must adjust the configuration so that Router A becomes the active router. Which commands should be applied to router A? (Choose two)

Options:

A.

vrrp 1 priority 90

B.

vrrp 1 timers advertise 1

C.

vrrp lip 10.1.0.11

D.

ip address 10.1.0.11 255.0.0.0

E.

vrrp 1 priority 120

Question 25

Which two functions is an edge node responsible for? (Choose two.)

Options:

A.

provides multiple entry and exit points for fabric traffic

B.

provides the default exit point for fabric traffic

C.

provides the default entry point for fabric traffic

D.

provides a host database that maps endpoint IDs to a current location

E.

authenticates endpoints

Question 26

What does the statement print(format(0.8, \0%')) display?

Options:

A.

80%

B.

8.8%

C.

.08%

D.

8%

Question 27

When deploying Cisco SD-Access Fabric APs, where does the data plane VXLAN tunnel terminate?

Options:

A.

on the first-hop fabric edge switch

B.

on the WLC node

C.

on the fabric border node switch

D.

directly on the fabric APs

Question 28

What is the API keys option for REST API authentication?

Options:

A.

a credential that is transmitted unencrypted

B.

one-time encrypted token

C.

a username that is stored in the local router

D.

a predetermined string that is passed from client to server.

Question 29

Refer to the exhibit. Which HTTP request produced the REST API response that was returned by the Cisco Catalyst Center (formerly DNA Center) platform?

Options:

A.

POST /auth/token

B.

GET /network-device

C.

GET /template-programmer/template/version/42a3df73-3ef4-49e2-b4f0-6927bbd4bf52

D.

POST /discovery

Question 30

Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request that configures a deny rule on an access list?

Options:

Question 31

What is a characteristics of a type 1 hypervisor?

Options:

A.

It runs on top of the host operating system.

B.

It is preferred for supporting nonproduction workloads.

C.

It has greater latency than a Type 2 hypervisor.

D.

It runs on top of bare metal servers.

Question 32

Refer to the exhibit.

Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 33

Which RF value represents the decline of the RF signal amplitude over a given distance"?

Options:

A.

signal-to-noise ratio

B.

received signal strength indicator

C.

free space path loss

D.

effective isotropic radiated power

Question 34

Which action is a LISP Map Resolver responsible for?

Options:

A.

forwarding user data traffic

B.

accepting map-request messages from ITRs

C.

finding EID-to-RLOC mappings

D.

accepting registration requests from ETRs

Question 35

A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?  

Options:

A.

host dependent  

B.

weighted

C.

least connection

D.

round robin

Question 36

What are two benefits of using Cisco TrustSec? (Choose two.)

Options:

A.

unknown file analysis using sandboxing

B.

advanced endpoint protection against malware

C.

end-to-end traffic encryption

D.

simplified management of network access

E.

consistent network segmentation

Question 37

Refer to the exhibit. An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required?

Options:

A.

Enable EAP parameters.

B.

Apply CISCO ISE default settings.

C.

Disable the RADIUS server accounting interim update.

D.

Select a RADIUS authentication server.

Question 38

Which method does FastLocate use to collect location-based information?

Options:

A.

RFID

B.

client probing

C.

beacons

D.

data packets

Question 39

An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement?

Options:

A.

RF

B.

WLAN

C.

Policy

D.

Flex

Question 40

Options:

Question 41

Options:

Question 42

Options:

Question 43

Options:

Question 44

Options:

Question 45

Options:

Question 46

Options:

Question 47

Options:

Question 48

Options:

Question 49

Options:

Question 50

Options:

Question 51

Options:

Question 52

Options:

Question 53

OR

Options:

Question 54

Options:

Question 55

Options:

Question 56

Options:

Question 57

Options:

Question 58

Options:

Question 59

Options:

Question 60

Options:

Question 61

Options:

Question 62

Options:

Question 63

Options:

Question 64

Options:

Question 65

Options:

Question 66

Options:

Question 67

Options:

Question 68

Options:

Page: 1 / 17
Total 258 questions