Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cisco 350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Exam Practice Test

Demo: 79 questions
Total 335 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Refer to the exhibit.

Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 2

Refer to the exhibit. What is determined from the output?

Options:

A.

10.0.0.100 is managed by Cisco Catalyst Center (formerly DNA Center).

B.

The URL for the second query is syntactically incorrect.

C.

The authentication for the second query fails.

D.

10.0.0.200 is known to DNA Center, but its ID is an empty string.

Question 3

Which type of API enables Cisco Catalyst Center (formerly DNA Center) to focus on outcome instead of the individual steps that are required to achieve the outcome?

Options:

A.

southbound Multivendor Support

B.

westbound Integration

C.

northbound Intent

D.

eastbound Events and Notifications

Question 4

Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.

Options:

Question 5

Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 6

Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two.)

Options:

A.

modular QoS

B.

policy routing

C.

web authentication

D.

DHCP

E.

IEEE 802.1x

Question 7

Refer to the exhibit. What is achieved by this Python script?

Options:

A.

It configures access list statements

B.

It reads access list statements into a dictionary list

C.

It displays access list statements on a terminal screen.

D.

It converts access list statements to a human-readable format.

Question 8

What is required for a VXLAN tunnel endpoint to operate?

Options:

A.

a VXLAN tunnel endpoint identifier

B.

at least one Layer 2 interface and one Layer 3 interlace

C.

at least one IP for the transit network and one IP for endpoint connectivity

D.

a VXLAN network identifier

Question 9

Which API does Cisco DNA Center use to retrieve information about images?

Options:

A.

SWIM

B.

Img-Mgmt

C.

PnP

D.

Client Health

Question 10

Assuming the WLC's interfaces are not in the same subnet as the RADIUS server, which interface would the WLC use as the source for all RADIUS-related traffic?

Options:

A.

the interface specified on the WLAN configuration

B.

any interface configured on the WLC

C.

the controller management interface

D.

the controller virtual interface

Question 11

Which AP mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?

Options:

A.

SE-connect mode

B.

sensor mode

C.

client mode

D.

sniffer mode

Question 12

What is the intent API in Cisco Catalyst Center (formerly DNA Center)?

Options:

A.

northbound consumer-facing RESTful API, which enables network discovery and configuration management

B.

southbound consumer-facing RESTful API. which enables network discovery and configuration management

C.

interface between the controller and the network devices, which enables network discovery and configuration management

D.

westbound interface, which allows the exchange of data such as ITSM. IPAM, and reporting information

Question 13

Where is radio resource management performed in a Cisco SD-Access wireless solution?

Options:

A.

DNA Center

B.

wireless controller

C.

Cisco CMX

D.

control plane node

Question 14

Which lag/profile on a Cisco Catalyst 9800 Series WLC must be modified to allow Cisco ISE to dynamically assign VLANs to users on an 802.1X-based SSID?

Options:

A.

interface lag

B.

site tag

C.

WLAN profile

D.

policy profile

Question 15

Exhibit.

Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?

Options:

A.

line vty 0 15

absolute-timeout 600

B.

line vty 0 15

exec-timeout

C.

line vty 01 5

exec-timeout 10 0

D.

line vty 0 4

exec-timeout 600

Question 16

What is the JSON syntax that is formed from the data?

Options:

A.

Make”:‘Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}

B.

'Make ”: “Gocar1, “Model”: “Zoom”, “Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]

C.

{“Make”: Gocar, “Model": Zoom, “Features": Power Windows, Manual Drive, Auto AC}

D.

(“Make”:[ “Gocar”, “Model": “Zoom"], Features”: [“Power Windows", “Manual Drive", “Auto AC”]}

Question 17

Drag and drop the command snippets from the right onto the boxes to create an EEM applet that will enable interface LoopbackO when the logging message 'Interface LoopbackO. changed state to administratively down" is received. Not all commands are used and some commands are used more than once.

Options:

Question 18

Which nodes require VXLAN encapsulation support In a Cisco SD-Access deployment?

Options:

A.

core nodes

B.

distribution nodes

C.

border nodes

D.

aggregation nodes

Question 19

Which two pieces of information are necessary to compute SNR? (Choose two.)

Options:

A.

EIRP

B.

noise floor

C.

antenna gain

D.

RSSI

E.

transmit power

Question 20

What is a client who is running 802.1x for authentication reffered to as?

Options:

A.

supplicant

B.

NAC device

C.

authenticate

D.

policy enforcement point

Question 21

Drag and drop characteristics of PIM dense mode from the left to the right.

Options:

Question 22

Which architectural component enables a zero-trust security model?

Options:

A.

management plane

B.

plug-and-play

C.

data plane

D.

control plane

Question 23

Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)

Options:

A.

integrated intrusion prevention

B.

VPN

C.

application-level inspection

D.

stateful packet inspection

E.

NAT

Question 24

Which feature provides data-plane security for Cisco Catalyst SD-WAN networks'?

Options:

A.

IPsec

B.

SSH

C.

IPS

D.

TLS/DTLS

Question 25

Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?

Options:

A.

All devices integrating with ISE

B.

selected individual devices

C.

all devices in selected sites

D.

all wired devices

Question 26

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?

Options:

A.

ISE server

B.

local WLC

C.

RADIUS server

D.

anchor WLC

Question 27

Which method is used by an AP to join HA controllers and is configured in NVRAM?

Options:

A.

Primary/Secondary- Tertiary/Backup

B.

stored WLC information

C.

DNS

D.

IP Helper Addresses

Question 28

Which AP mode allows an engineer to scan configured channels for rogue access points?

Options:

A.

sniffer

B.

monitor

C.

bridge

D.

local

Question 29

A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?  

Options:

A.

host dependent  

B.

weighted

C.

least connection

D.

round robin

Question 30

Refer to the exhibit.

What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

Options:

A.

A NETCONF request was made for a data model that does not exist.

B.

The device received a valid NETCONF request and serviced it without error.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

D.

The NETCONF running datastore is currently locked.

Question 31

Which location tracking method is used when locating client devices using Cisco hyperlocation?

Options:

A.

angle of arrival

B.

location patterning

C.

TTL

D.

line of sight

Question 32

Which antenna type should be used for a site-to-site wireless connection?

Options:

A.

omnidirectional

B.

patch

C.

dipole

D.

Yagi

Question 33

Refer to the exhibit. Which result does the python code achieve?

Options:

A.

The code encrypts a base64 decrypted password.

B.

The code converts time to the "year/month/day" time format.

C.

The code converts time to the yyyymmdd representation.

D.

The code converts time to the Epoch LINUX time format.

Question 34

What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?

Options:

A.

It facilitates software upgrades to network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It uses a predefined configuration through parameterized elements or variables.

D.

It provides a high-level overview of the health of every network device.

Question 35

Refer to the exhibit.

An engineer attempts to connect to another device from Route1’s console port. Which configuration is needed to allow telnet connections?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 36

What are two device roles in the Cisco SD-Access fabric? (Choose two.)

Options:

A.

access switch

B.

vBond controller

C.

edge node

D.

core switch

E.

border node

Question 37

Which two actions are recommended as security best practices to protect REST API? (Choose two.)

Options:

A.

Use SSL for encryption.

B.

Enable out-of-band authentication.

C.

Enable dual authentication of the session.

D.

Use TACACS+ authentication.

E.

Use a password hash.

Question 38

When should the MAC authentication bypass feature be used on a switch port?

Options:

A.

when authentication is required, but the attached host does not support 802.1X

B.

when the attached host supports 802.1X and must authenticate itself based on its MAC address instead of user credentials

C.

when authentication should be bypassed for select hosts based on their MAC address

D.

when the attached host supports limited 802.1X

Question 39

An engineer is reviewing a PCAP file that contains a packet capture of a four-way handshake exchange between a dient and AP using WPA2 Enterprise Which EAPOL message validates and confirms that the client device has successfully Installed the GTK?

Options:

A.

M4-Message

B.

M3-Message

C.

M2-Message

D.

M1-Message

Question 40

Which action controls the maximum cell size in a high-density wireless environment?

Options:

A.

Statically set TX power on access points to max.

B.

Disable low data rates.

C.

Set mandatory data rates.

D.

Decrease TX power on access points.

Question 41

An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement?

Options:

A.

RF

B.

WLAN

C.

Policy

D.

Flex

Question 42

What is a benefit of using segmentation with TrustSec?

Options:

A.

Integrity checks prevent data from being modified in transit.

B.

Security group tags enable network segmentation.

C.

Firewall rules are streamlined by using business-level profiles.

D.

Packets sent between endpoints on a LAN are encrypted using symmetric key cryptography.

Question 43

Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?

Options:

A.

Device(config)# netconf lock-time 500

B.

Device(config)# netconf max-message 1000

C.

Device(config)# no netconf ssh acl 1

D.

Device(config)# netconf max-sessions 100

Question 44

Refer to the exhibit. How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 45

Drag and drop the characteristics from the left onto the corresponding orchestration tool on the right.

Options:

Question 46

Which technology is the Cisco SD-Access control plane based on?

Options:

A.

IS-IS

B.

LISP

C.

Cisco TrustSec

D.

VXLAN

Question 47

A response code of 404 is received while using the REST API on Cisco UNA Center to POST to this URI.

/dna/intent/api/v1 /template-programmer/project

What does the code mean?

Options:

A.

The client made a request a resource that does not exist.

B.

The server has not implemented the functionality that is needed to fulfill the request.

C.

The request accepted for processing, but the processing was not completed.

D.

The POST/PUT request was fulfilled and a new resource was created, Information about the resource is in the response body.

Question 48

In a Cisco Mobility Express wireless deployment, which AP takes over if the primary AP fails?

Options:

A.

AP with highest IP address

B.

AP with the lowest IP address

C.

AP with highest MAC address

D.

AP with highest controller up time

Question 49

Which two functions is an edge node responsible for? (Choose two.)

Options:

A.

provides multiple entry and exit points for fabric traffic

B.

provides the default exit point for fabric traffic

C.

provides the default entry point for fabric traffic

D.

provides a host database that maps endpoint IDs to a current location

E.

authenticates endpoints

Question 50

Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.

Options:

Question 51

Options:

Question 52

Options:

Question 53

Options:

Question 54

Options:

Question 55

Options:

Question 56

Options:

Question 57

Options:

Question 58

Options:

Question 59

Options:

Question 60

Options:

Question 61

Options:

Question 62

Options:

Question 63

Options:

Question 64

Options:

Question 65

Options:

Question 66

Options:

Question 67

OR

Options:

Question 68

Options:

Question 69

Options:

Question 70

Options:

Question 71

Options:

Question 72

Options:

Question 73

Options:

Question 74

Options:

Question 75

Options:

Question 76

Options:

Question 77

Options:

Question 78

Options:

Question 79

Options:

Demo: 79 questions
Total 335 questions