Big Halloween Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Cisco 350-401 Dumps Questions Answers

Page: 1 / 14
Total 380 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Options:

Buy Now
Question 2

Options:

Question 3

Options:

Question 4

Options:

Question 5

Options:

Question 6

Options:

Question 7

Options:

Question 8

Options:

Question 9

Options:

Question 10

Options:

Question 11

Options:

Question 12

Options:

Question 13

Options:

Question 14

Options:

Question 15

Options:

Question 16

Options:

Question 17

Options:

Question 18

Options:

Question 19

Options:

Question 20

Options:

Question 21

Options:

Question 22

OR

Options:

Question 23

Options:

Question 24

Options:

Question 25

Options:

Question 26

Options:

Question 27

Options:

Question 28

Options:

Question 29

Options:

Question 30

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 31

Which two Cisco SD-Access components provide communication between traditional network elements and the controller layer? (Choose two.)

Options:

A.

network underlay

B.

network control platform

C.

network data platform

D.

partner ecosystem

E.

fabric overlay

Question 32

Which characteristic applies to Cisco SD-Access?

Options:

A.

It uses dynamic routing the discover and provision access switches.

B.

It uses VXLAN for the control plane

C.

It uses VXLAN for the data plane

D.

It uses dynamic routing to discover and provision border switches

Question 33

Why would an architect use an OSPF virtual link?

Options:

A.

to allow a stub area to transit another stub area

B.

to merge two existing Area 0s through a nonbackbone

C.

to connect two networks that have overlapping private IP address space

D.

to connect a nonbackbone area to Area 0 through another nonbackbone area

Question 34

Which access control feature does MAB provide?

Options:

A.

user access based on IP addressB slows devices to bypass authentication

B.

network access based on the physical address of a device

C.

simultaneous user and device authentication

Question 35

In a high-density AP environment, which feature can be used to reduce the RF cell size and not demodulate radio packets above a given threshold?

Options:

A.

RX-SOP

B.

FRA

C.

80211k

D.

RRM

Question 36

Which task Is mandatory when provisioning a device through the plug-and-play workflow in Cisco DNA Center?

Options:

A.

site assignment

B.

slack serial number assignment

C.

golden image upgrade

D.

template configuration application

Question 37

What is the function of the statement "import actions" in this script?

Options:

A.

It imports the functions that are not available natively in Python

B.

It imports the functions of a third-party module

C.

It imports a Python module

D.

It imports an external reference

Question 38

A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described?

Options:

A.

intra-VLAN

B.

inter-controller

C.

intra-controller

D.

inter-subnet

Question 39

Refer to the exhibit.

What does the snippet of code achieve?

Options:

A.

It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

B.

It opens a tunnel and encapsulates the login information, if the host key is correct.

C.

It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

D.

It creates an SSH connection using the SSH key that is stored, and the password is ignored.

Question 40

What is one characteristic of Cisco Catalyst Center (formerly DNA Center) and vManage northbound APIs?

Options:

A.

They implement the NETCONF protocol.

B.

They push configuration changes down to devices.

C.

They exchange XML-formatted content.

D.

They implement the RESTCONF protocol.

Question 41

Refer to the exhibit.

Which JSON syntax is derived from this data?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 42

What is two characteristic of Cisco DNA Center and vManage northbound APIs?

Options:

A.

They exchange XML-formatted content

B.

They exchange JSON-kxmatted content.

C.

They implement the RESTCONF protocol.

D.

They implement the NETCONF protocol.

E.

They exchange protobuf-formatted content.

Question 43

Refer to the exhibit. A customer reports that many wireless clients cannot reliably receive multicast audio. Which action resolves this issue?

Options:

A.

Set the 24 Mbps and 54 Mbps data rates to Supported.

B.

Set the RSSI Threshold to -67dBm.

C.

Set the Fragmentation Threshold to 1250 bytes

D.

Disable RSSI Low Check.

Question 44

An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?

Options:

A.

EAP-TLS

B.

EAP-FAST

C.

LDAP

D.

PEAP

Question 45

Which tool functions in a push model, supports languages like Python or Ruby, and does not require an agent to be installed per host?

Options:

A.

Puppet

B.

Ansible

C.

Saltstack

D.

Chef

Question 46

Which authorization framework gives third-party applications limited access to HTTP services?

Options:

A.

IPsec

B.

GRE

C.

Basic Auth

D.

OAuth 2.0

Question 47

Refer to the exhibit. A customer asks an engineer to create a new secure WLAN to support only WPA3. Users must connect using a passphrase. Which encryption and key management configuration is required?

Options:

A.

CCMP256 encryption with CCKM key management

B.

GCMP128 encryption with OWE key management

C.

CCMP128 encryption with SAE key management

D.

GCMP256 encryption with 802.1x key management

Question 48

Refer to the exhibit. A customer reports occasional brief audio dropouts on its Cisco Wi-Fi phones. The environment consists of a Cisco Catalyst 9800 Series WLC with Catalyst 9120 APs running RRM. The phones connect on the 5-GHz band. Which action resolves this issue?

Options:

A.

Enable Media Stream Multicast-direct.

B.

Disable Coverage Hole Detection.

C.

Set WMM Policy to Required.

D.

Enable Defer Priority 6.

Question 49

An engineer must configure a new WLAN that supports 802.11r and requires users to enter a passphrase. What must be configured to support this requirement?

Options:

A.

802.1XandSUITEB-1X

B.

FT PSK and Fast Transition

C.

802.1X and Fast Transition

D.

FTPSKandSUITEB-1X

Question 50

What is calculated using the numerical values of the transmitter power level, cable loss, and antenna gain?

Options:

A.

EIRP

B.

dBi

C.

RSSI

D.

SNR

Question 51

An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?

Options:

A.

event manager applet ENABLE_OSPF_DEBUGevent syslog pattern "%OSPF-1-ADJCHG: Process 5. Nbr 1.1.1.1 on SerialO/0 from FULL to DOWN"action 1.0 cli command "debug ip ospf event"action 2.0 cli command "debug ip ospf adj"action 3.0 syslog priority informational msg "ENABLE_OSPF_DEBUG

B.

event manager applet ENABLEOSPFDEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 5, Nbr 1.1.1.1 on SerialO/0 from LOADING to FULL"action 1.0 cli command "debug ip ospf event"action 2.0 cli command "debug ip ospf adj"action 3.0 syslog priority informational msg "ENABLE JDSPF_DEBUG"

C.

event manager apple! ENABLE OSPFDEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 5. Nbr 1.1.1.1 on SerialO/0 from LOADING to FULL"action 1.0 cli command "enable"action 2.0 cli command "debug ip ospf event"action 3.0 cli command "debug ip ospf adj"action 4.0 syslog priority informational msg "ENABLE_OSPFJ} EBUG"

D.

event manager applet ENABLE_OSPF_DEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 6. Nbr 1.1.1.1 on SerialO/0 from FULL to DOWN"action 1.0 cli command "enable"action 2.0 cli command "debug ip ospf event"action 3.0 cli command "debug ip ospf adj"action 4.0 syslog priority informational msg "ENABLE_OSPF_DEBUG'*

Question 52

Which nodes require VXLAN encapsulation support In a Cisco SD-Access deployment?

Options:

A.

core nodes

B.

distribution nodes

C.

border nodes

D.

aggregation nodes

Question 53

Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two.)

Options:

A.

modular QoS

B.

policy routing

C.

web authentication

D.

DHCP

E.

IEEE 802.1x

Question 54

How is a data modelling language used?

Options:

A.

To enable data to be easily structured grouped validated and replicated

B.

To represent finite and well-defined network elements that cannot be changed

C.

To model the flows of unstructured data within the infrastructure

D.

To provide human readability to scripting languages

Question 55

What does a next-generation firewall that is deployed at the data center protect against?

Options:

A.

signature-based malware

B.

DMZ web server vulnerabilities

C.

zero-day attacks

D.

DDoS

Question 56

Which feature is offered by the Cisco Advanced Malware Protection for Endpoints solution?

Options:

A.

DNS Protection

B.

NetFlow

C.

Trustsec

D.

File Sandboxing

Question 57

What is the role of the vSmart controller in a Cisco Catalyst SD-WAN environment?

Options:

A.

It is the centralized network management system.

B.

It manages the data plane.

C.

It manages the control plane.

D.

It performs authentication and authorization.

Page: 1 / 14
Total 380 questions