Weekend Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Exam Practice Test

Page: 1 / 19
Total 188 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

What is an advantage of utilizing data models in a multivendor environment?

Options:

A.

facilitating a unified approach to configuration and management

B.

improving communication security with binary-encoded protocols

C.

lowering CPU load incurred to managed devices

D.

removing the distinction between configuration and runtime state data

Question 2

Which lag/profile on a Cisco Catalyst 9800 Series WLC must be modified to allow Cisco ISE to dynamically assign VLANs to users on an 802.1X-based SSID?

Options:

A.

interface lag

B.

site tag

C.

WLAN profile

D.

policy profile

Question 3

In Cisco Catalyst Center (formerly DNA Center) Inventory, the Software Version of a network device displays a status of OUTDATED. What does It me?

Options:

A.

There is a later software version available on Cisco Catalyst Center (formerly DNA Center).

B.

The current software image does not match the selected Golden image for this type of network device.

C.

The current type of software image does not match the type of the network device.

D.

There is a later software version available at www.cisco.com website.

Question 4

To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?

Options:

A.

security ft adaptive

B.

security wpa akm dotlx

C.

security wpa akm psk

D.

security wpa akm ft psk

Question 5

A response code of 404 is received while using the REST API on Cisco UNA Center to POST to this URI.

/dna/intent/api/v1 /template-programmer/project

What does the code mean?

Options:

A.

The client made a request a resource that does not exist.

B.

The server has not implemented the functionality that is needed to fulfill the request.

C.

The request accepted for processing, but the processing was not completed.

D.

The POST/PUT request was fulfilled and a new resource was created, Information about the resource is in the response body.

Question 6

Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request that configures a deny rule on an access list?

Question # 6

Options:

Question 7

Question # 7

Refer to the exhibit Which command set is required on router R1 to allow the network administrator to authenticate via RADIUS'?

Question # 7

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 8

What is a characteristic of VRRP?

Options:

A.

It inherently balances load amongst the available gateways.

B.

It ensures symmetric traffic flow upstream and downstream.

C.

It Is a Cisco proprietary protocol.

D.

It uses a virtual IP address and a virtual MAC address to achieve redundancy

Question 9

An engineer must configure a new 6 Ghz only SSID on a cisco catalyst 9800 series WLC, with these requirements:

    Provide 802.11ax data rates for supported devices

    All users authenticate using a certificate

Which wireless layer 2 security mode meets the requirements?

Options:

A.

WPA2 Enterprise

B.

WPA3 Personal

C.

WPA2 Personal

D.

WPA3 Enterprise

Question 10

Which technology collects location information through data packets received by the APs instead of using mobile device probes?

Options:

A.

detect and locate

B.

FastLocate

C.

hyperlocation

D.

RF fingerprinting

Question 11

What is the function of an intermediate node in a Cisco SD-Access fabric?

Options:

A.

to route packets within the fabric based on the Layer 3 information in the header

B.

to provide an entry and exit point between the fabric and external resources

C.

to encapsulate and de-encapsulate packets with a VXLAN header

D.

to provide reachability between fabric clients and nonfabric clients on the same subnet

Question 12

A script contains the statement white loop != 999 ’ Which value terminates the loop?

Options:

A.

A value equal to 999.

B.

A value not equal to 999.

C.

A value greater than or equal to 999.

D.

A value less than or equal to 999.

Question 13

Which protocol is used by vmanage to push centralized policies to vsmart controllers?

Options:

A.

NETCONF

B.

TLS

C.

STUN

D.

OMP

Question 14

What does the statement print(format(0.8, \0%')) display?

Options:

A.

80%

B.

8.8%

C.

.08%

D.

8%

Question 15

Drag and drop the automation characteristics from the left to the corresponding tools on the right.

Question # 15

Options:

Question 16

What is the data policy in a Cisco SD-WAN deployment?

Options:

A.

list of ordered statements that define node configurations and authentication used within the SD-WAN overlay

B.

set of statements that defines how data is forwarded based on IP pocket information and specific VPNs

C.

detailed database mapping several kinds of addresses with their corresponding location

D.

group of services tested to guarantee devices and links liveliness within the SD-WAN overlay

Question 17

Refer to the exhibit.

Question # 17

What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

Options:

A.

A NETCONF request was made for a data model that does not exist.

B.

The device received a valid NETCONF request and serviced it without error.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

D.

The NETCONF running datastore is currently locked.

Question 18

What is the primary responsibility of the vBond orchestrator?

Options:

A.

to provide centralized management and provisioning of all elements into the network

B.

to configure NAT communication on WAN Edge routers

C.

to provide configuration synchronization of an WAN Edge devices

D.

to facilitate start-up by performing authentication and authorization of all elements into the network

Question 19

An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement?

Options:

A.

RF

B.

WLAN

C.

Policy

D.

Flex

Question 20

Drag and drop the snippets onto the blanks within the code to create an EEM script that adds an entry to a locally stored text file with a timestamp when a configuration change is made. Not all options are used.

Question # 20

Options:

Question 21

What is the intent API in Cisco Catalyst Center (formerly DNA Center)?

Options:

A.

northbound consumer-facing RESTful API, which enables network discovery and configuration management

B.

southbound consumer-facing RESTful API. which enables network discovery and configuration management

C.

interface between the controller and the network devices, which enables network discovery and configuration management

D.

westbound interface, which allows the exchange of data such as ITSM. IPAM, and reporting information

Question 22

Which AP mode analyzes the spectrum to detect sources of interference?

Options:

A.

Monitor

B.

Rogue detector

C.

SE-Connect

D.

Sniffer

Question 23

What are two of benefits of using VXLAN? (Choose two.)

Options:

A.

It allows for an unlimited number of segments.

B.

It has fewer devices to manage.

C.

It uses all available Layer 3 paths in the underlying network.

D.

It allows multi-tenanted segmentation.

E.

It uses a MAC in IP/TCP encapsulation technique.

Question 24

What is the API keys option for REST API authentication?

Options:

A.

a credential that is transmitted unencrypted

B.

one-time encrypted token

C.

a username that is stored in the local router

D.

a predetermined string that is passed from client to server.

Question 25

Question # 25

Refer to the exhibit. A POST /discovery request spawns an asynchronous task. After querying for more information about the task, the Cisco DNA Center platform returns the REST API response. What is the status of the discovery task?

Options:

A.

restarted

B.

failed

C.

stopped

D.

successful

Question 26

An engineer must protect their company against ransom ware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?

Options:

A.

Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation.

B.

Use Cisco AMP deployment with the Malicious Activity Protection engine enabled.

C.

Use Cisco AMP deployment with the Exploit Prevention engine enabled.

D.

Use Cisco Firepower and block traffic to TOR networks.

Question 27

A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?

Options:

A.

Identity PSK

B.

Fast Transition

C.

Central Web Authentication

D.

Cisco Centralized Key Management

Question 28

What is a characteristics of a type 1 hypervisor?

Options:

A.

It runs on top of the host operating system.

B.

It is preferred for supporting nonproduction workloads.

C.

It has greater latency than a Type 2 hypervisor.

D.

It runs on top of bare metal servers.

Question 29

Question # 29

Question # 29

Options:

Question 30

Question # 30

Question # 30

Options:

Question 31

Question # 31

Question # 31

Options:

Question 32

Question # 32

Question # 32

Options:

Question 33

Question # 33

Options:

Question 34

Question # 34

Question # 34

Options:

Question 35

Question # 35

Question # 35

Options:

Question 36

Question # 36

Question # 36

Options:

Question 37

Question # 37

OR

Question # 37

Question # 37

Options:

Question 38

Question # 38

Question # 38

Options:

Question 39

Question # 39

Question # 39

Options:

Question 40

Question # 40

Question # 40

Options:

Question 41

Question # 41

Question # 41

Options:

Question 42

Question # 42

Question # 42

Options:

Question 43

Question # 43

Question # 43

Options:

Question 44

Question # 44

Question # 44

Options:

Question 45

Question # 45

Question # 45

Question # 45

Options:

Question 46

Question # 46

Question # 46

Options:

Question 47

Question # 47

Question # 47

Options:

Question 48

Question # 48

Question # 48

Question # 48

Question # 48

Options:

Question 49

Question # 49

Question # 49

Options:

Question 50

Question # 50

Question # 50

Question # 50

Options:

Question 51

Question # 51

Question # 51

Options:

Question 52

Question # 52

Question # 52

Options:

Question 53

Question # 53

Question # 53

Options:

Question 54

Question # 54

Question # 54

Options:

Question 55

Question # 55

Question # 55

Options:

Question 56

Question # 56

Question # 56

Options:

Page: 1 / 19
Total 188 questions