Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Cisco 350-401 Dumps Questions Answers

Page: 1 / 20
Total 335 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Which antenna type should be used for a site-to-site wireless connection?

Options:

A.

omnidirectional

B.

patch

C.

dipole

D.

Yagi

Buy Now
Question 2

Refer to the exhibit. What does this code achieve?!

Options:

A.

It generates a list containing only the hostname of the LLDP neighbor.

B.

It generates a list of the LLDP neighbors and their capabilities

C.

It generates a list of routers with the Repeater capability.

D.

It generates a count of the LLDP neighbors.

Question 3

Why are stateless calls executed by REST API useful in cloud applications?

Options:

A.

They use HTTPS to implement all calls.

B.

They control URL decoding.

C.

They are easy to redeploy and to scale.

D.

They rely on data stored on the server for calls.

Question 4

Which function is performed by vSmart in the Cisco Catalyst SD-WAN architecture?

Options:

A.

facilitation of NAT detection and traversal

B.

redistribution between OMP and other routing protocols

C.

distribution of IPsec keys

D.

execution of localized policies

Question 5

Refer to the exhibit.

Which JSON syntax is derived from this data?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 6

What is an advantage of utilizing data models in a multivendor environment?

Options:

A.

facilitating a unified approach to configuration and management

B.

improving communication security with binary-encoded protocols

C.

lowering CPU load incurred to managed devices

D.

removing the distinction between configuration and runtime state data

Question 7

What is a benefit of MACsec in a multilayered LAN network design?

Options:

A.

There is no requirement to run IEEE 802.1X when MACsec is enabled on a switch port.

B.

Layer 2 trunk links between switches can be secured.

C.

Application flows between hosts on the LAN to remote destinations can be encrypted.

D.

Layer 3 links between switches can be secured.

Question 8

Which features does Cisco EDR use to provide threat detection and response protection?

Options:

A.

containment, threat intelligence, and machine learning

B.

firewalling and intrusion prevention

C.

container-based agents

D.

cloud analysts and endpoint firewall controls

Question 9

Why would a network engineer configure an AP in SE-Connect mode?

Options:

A.

to redirect WLAN traffic to an endpoint for protocol analysis

B.

to monitor the VLAN traffic for rogue APs

C.

to connect the wired LAN with the wireless infrastructure

D.

to analyze the RF spectrum surrounding the AP

Question 10

In a campus network design, what are two benefits of using BFD for failure detection'? (Choose two.)

Options:

A.

BFD speeds up routing convergence time

B.

BFD provides path failure detection in less than a second

C.

BFD provides fault tolerance by enabling multiple routers to appear as a single virtual router

D.

BFD is an efficient way to reduce memory and CPU usage

E.

BFD enables network peers to continue forwarding packets in the event of a restart

Question 11

Which location tracking method is used when locating client devices using Cisco hyperlocation?

Options:

A.

angle of arrival

B.

location patterning

C.

TTL

D.

line of sight

Question 12

Drag and drop the code snippets from the bottom onto the blanks in the Python script to print the device model to the screen and write JSON data to a file. Not all options are used

Options:

Question 13

Drag and drop the code snippets from the bottom onto blanks m the Python script so that the program changes the IP address and saves It as a new JSON Me on the disk Not all options are used

Options:

Question 14

Drag and drop the automation characteristics from the left onto the corresponding tools on the right. Not all options are used.

Options:

Question 15

An engineer is installing a new pair of routers in a redundant configuration. Which protocol ensures that traffic is not disrupted in the event of a hardware failure?

Options:

A.

HSRPv1

B.

GLBP

C.

VRRP

D.

HSRPv2

Question 16

Refer to the exhibit.

An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?

Options:

A.

B.

C.

D.

Question 17

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?

Options:

A.

EIRP

B.

mW

C.

dBm

D.

dBi

Question 18

What is the JSON syntax that is formed the data?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 19

A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?

Options:

A.

Identity PSK

B.

Fast Transition

C.

Central Web Authentication

D.

Cisco Centralized Key Management

Question 20

What is a fact about Cisco EAP-FAST?

Options:

A.

It requires a client certificate.

B.

It operates in transparent mode.

C.

It Is an IETF standard.

D.

It does not require a RADIUS server certificate.

Question 21

A script contains the statement •white loop != 999 ’ Which value terminates the loop?

Options:

A.

A value equal to 999.

B.

A value not equal to 999.

C.

A value greater than or equal to 999.

D.

A value less than or equal to 999.

Question 22

Which technology reduces the implementation of STP and leverages both unicast and multicast?

Options:

A.

VLAN

B.

VXLAN

C.

VPC

D.

VSS

Question 23

Why would an architect use an OSPF virtual link?

Options:

A.

to allow a stub area to transit another stub area

B.

to merge two existing Area 0s through a nonbackbone

C.

to connect two networks that have overlapping private IP address space

D.

to connect a nonbackbone area to Area 0 through another nonbackbone area

Question 24

An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionally?

Options:

A.

CCKM

B.

WPA2 policy

C.

Local Policy

D.

Web Policy

Question 25

Which unit measures the power of a radio signal with reference to 1 milliwatt?

Options:

A.

dBi

B.

mW

C.

dBw

D.

dBm

Question 26

Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?

Options:

A.

ETR

B.

MS

C.

ITR

D.

MR

Question 27

Which method is used by an AP to join HA controllers and is configured in NVRAM?

Options:

A.

Primary/Secondary- Tertiary/Backup

B.

stored WLC information

C.

DNS

D.

IP Helper Addresses

Question 28

Which feature is needed to maintain the IP address of a client when an inter-controller Layer 3 roam is performed between two WLCs that are using different mobility groups?

Options:

A.

interface groups

B.

RF groups

C.

AAA override

D.

auto anchor

Question 29

Refer to the exhibit. Authentication for users must first use RADIUS, and fall back to the local database on the router if the RADIUS server is unavailable Which two configuration sets are needed to achieve this result? (Choose two.)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 30

An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:

Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.

After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.

The contents of the JSON-formatted file are as follows

Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.

Options:

Question 31

In Cisco CatalystCenter(formerly DNA Center) Inventory, the Software Version of a networkdevice displays a status of OUTDATED. What does It me?

Options:

A.

There is a later software version available on Cisco Catalyst Center (formerly DNA Center).

B.

The current software image does not match the selected Golden image for this type of network device.

C.

The current type of software image does not match the type of the network device.

D.

There is a later software version available at www.cisco.com website.

Question 32

Which action reduces sticky clients in dense RF environments?

Options:

A.

Decrease radio channel widths to 40 MHz.

B.

Increase the mandatory minimum data rates.

C.

Decrease the mandatory minimum data rates.

D.

Increase radio channel widths to 160 MHz.

Question 33

What is used by vManage to interact with Cisco SD-WAN devices in the fabric?

Options:

A.

northbound API

B.

RESTCONF

C.

sounthbound API

D.

IPsec

Question 34

In a wireless network environment, which measurement compares the received signal to the background noise?

Options:

A.

free space path loss

B.

link power budget

C.

fading

D.

SNR

Question 35

Which two pieces of information are necessary to compute SNR? (Choose two.)

Options:

A.

EIRP

B.

noise floor

C.

antenna gain

D.

RSSI

E.

transmit power

Question 36

Refer to the exhibit A network engineer must use a Python script lo convert data received from a network device. Which type of data is printed to the console when the script runs?

Options:

A.

dictionary with a key-value pair

B.

list of lists

C.

list of strings

D.

tuple list

Question 37

Which NGFW mode block flows crossing the firewall?

Options:

A.

Passive

B.

Tap

C.

Inline tap

D.

Inline

Question 38

Drag and drop the characteristics from the left onto the corresponding orchestration tool on the right.

Options:

Question 39

Drag and drop the automation characteristics from the left to the corresponding tools on the right.

Options:

Question 40

Which tool functions in a push model, supports languages like Python or Ruby, and does not require an agent to be installed per host?

Options:

A.

Puppet

B.

Ansible

C.

Saltstack

D.

Chef

Question 41

Which technology collects location information through data packets received by the APs instead of using mobile device probes?

Options:

A.

detect and locate

B.

FastLocate

C.

hyperlocation

D.

RF fingerprinting

Question 42

With IGMPv2, which multicast group address does the IGMP querier use to send query messages to all hosts on the LAN?

Options:

A.

239.0.0.2

B.

224.0.0.1

C.

239.0.0.1

D.

224.0.0.2

Question 43

Exhibit.

Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?

Options:

A.

line vty 0 15

absolute-timeout 600

B.

line vty 0 15

exec-timeout

C.

line vty 01 5

exec-timeout 10 0

D.

line vty 0 4

exec-timeout 600

Question 44

Which feature allows HSRP to failover from the active route processor to the standby route processor without loss of data or path change?

Options:

A.

preemption

B.

IP SLA tracking

C.

stateful switchover

D.

HSRP tracking

Question 45

Drag and drop the threat defense solutions from the left onto their descriptions on the right.

Options:

Question 46

A company hires a network architect to design a new OTT wireless solution within a Cisco SD-Access Fabric wired network. The architect wants to register access points to the WLC to centrally switch the traffic. Which AP mode must the design include?

Options:

A.

Bridge

B.

Fabric

C.

FlexConnect

D.

local

Question 47

What is a characteristic of a traditional WAN?

Options:

A.

low complexity and high overall solution scale

B.

centralized reachability. security, and application policies

C.

operates over DTLS and TLS authenticated and secured tunnels

D.

unified data plane and control plane

Question 48

Which two functions is an edge node responsible for? (Choose two.)

Options:

A.

provides multiple entry and exit points for fabric traffic

B.

provides the default exit point for fabric traffic

C.

provides the default entry point for fabric traffic

D.

provides a host database that maps endpoint IDs to a current location

E.

authenticates endpoints

Question 49

What is the base unit of definition in YANG?

Options:

A.

module

B.

include statement

C.

stanza

D.

node

Question 50

At which plane does vBond operate in Cisco SD-WAN solutions?

Options:

A.

control plane

B.

data plane

C.

orchestration plane

D.

management plane

Question 51

Options:

Question 52

Options:

Question 53

Options:

Question 54

Options:

Question 55

Options:

Question 56

Options:

Question 57

Options:

Question 58

Options:

Question 59

Options:

Question 60

Options:

Question 61

Options:

Question 62

Options:

Question 63

OR

Options:

Question 64

Options:

Question 65

Options:

Question 66

Options:

Question 67

Options:

Question 68

Options:

Question 69

Options:

Question 70

Options:

Question 71

Options:

Question 72

Options:

Question 73

Options:

Question 74

Options:

Question 75

Options:

Question 76

Options:

Question 77

Options:

Question 78

Options:

Question 79

Options:

Page: 1 / 20
Total 335 questions