Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cisco 350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Exam Practice Test

Demo: 68 questions
Total 258 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Which technology collects location information through data packets received by the APs instead of using mobile device probes?

Options:

A.

detect and locate

B.

FastLocate

C.

hyperlocation

D.

RF fingerprinting

Question 2

Refer to the exhibit An engineer is troubleshooting an issue with non-Wi-Fi interference on the 5-GHz band The engineer has enabled Cisco CleanAir and set the appropriate traps, but the AP does not change the channel when it detects significant interference Which action will resolve the issue?

Options:

A.

Enable the Avoid Persistent Non-WiFi Interference option

B.

Disable the Avoid Foreign AP Interference option.

C.

Change the DCA Sensitivity option to High

D.

Enable the Event Driven Radio Resource Management option

Question 3

What is a benefit of MACsec in a multilayered LAN network design?

Options:

A.

There is no requirement to run IEEE 802.1X when MACsec is enabled on a switch port.

B.

Layer 2 trunk links between switches can be secured.

C.

Application flows between hosts on the LAN to remote destinations can be encrypted.

D.

Layer 3 links between switches can be secured.

Question 4

What is the intent API in Cisco Catalyst Center (formerly DNA Center)?

Options:

A.

northbound consumer-facing RESTful API, which enables network discovery and configuration management

B.

southbound consumer-facing RESTful API. which enables network discovery and configuration management

C.

interface between the controller and the network devices, which enables network discovery and configuration management

D.

westbound interface, which allows the exchange of data such as ITSM. IPAM, and reporting information

Question 5

Which two components are needed when a Cisco SD-Access fabric is designed? (Choose two.)

Options:

A.

Cisco Catalyst Center (formerly DNA Center) application

B.

Firepower Threat Defense

C.

Identity Service Engine

D.

Cisco Data Center Network Manager

E.

Cisco Prime Infrastructure

Question 6

In a campus network design, what are two benefits of using BFD for failure detection'? (Choose two.)

Options:

A.

BFD speeds up routing convergence time

B.

BFD provides path failure detection in less than a second

C.

BFD provides fault tolerance by enabling multiple routers to appear as a single virtual router

D.

BFD is an efficient way to reduce memory and CPU usage

E.

BFD enables network peers to continue forwarding packets in the event of a restart

Question 7

Which task Is mandatory when provisioning a device through the plug-and-play workflow in Cisco DNA Center?

Options:

A.

site assignment

B.

slack serial number assignment

C.

golden image upgrade

D.

template configuration application

Question 8

Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request that configures a deny rule on an access list?

Options:

Question 9

What is a characteristic of omnidirectional antennas?

Options:

A.

It includes dish antennas.

B.

It has high gain.

C.

It provides the most focused and narrow beamwidth.

D.

It includes dipole antennas.

Question 10

An engineer must configure a new 6 Ghz only SSID on a cisco catalyst 9800 series WLC, with these requirements:

    Provide 802.11ax data rates for supported devices

    All users authenticate using a certificate

Which wireless layer 2 security mode meets the requirements?

Options:

A.

WPA2 Enterprise

B.

WPA3 Personal

C.

WPA2 Personal

D.

WPA3 Enterprise

Question 11

Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used.

Options:

Question 12

An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?

Options:

A.

EAP-TLS

B.

EAP-FAST

C.

LDAP

D.

PEAP

Question 13

Which data is properly formatted with JSON?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 14

How does Cisco DNA Center perform a network discovery?

Options:

A.

using SNMP

B.

using ICMP

C.

through a DHCP server

D.

using CDP with a seed IP address

Question 15

Refer to the exhibit. Running the script causes the output in the exhibit. What should be the first line of the script?

Options:

A.

import manager

B.

ncclient manager import

C.

from ncclient import *

D.

from ncclient import manager

Question 16

Which two southbound interfaces originate from Cisco Catalyst Center (formerly DNA Center) and terminate at fabric underlay switches'? (Choose two.)

Options:

A.

ICMP Discovery

B.

UDP67 DHCP

C.

TCP 23 Telnet

D.

UDP6007 NetFlow

E.

UDP 162 SNMP

Question 17

At which plane does vBond operate in Cisco SD-WAN solutions?

Options:

A.

control plane

B.

data plane

C.

orchestration plane

D.

management plane

Question 18

Refer to the exhibit. An engineer builds an EEM script to apply an access list. Which statement must be added to complete the script?

Options:

A.

event none

B.

action 6.0 cli command "ip access-list extended 101"

C.

action 2.1 cli command "ip access-list extended 101"

D.

action 3.1 cli command "ip access-list extended 101"

Question 19

Drag and drop the snippets onto the blanks within the code to create an EEM script that adds an entry to a locally stored text file with a timestamp when a configuration change is made. Not all options are used.

Options:

Question 20

Which characteristics applies to Cisco SD-Access?

Options:

A.

It uses dynamic routing to discover and provision the border and edge switches

B.

It uses VXLAN for the control plane

C.

It uses PnP to discover and provision border and access switches

D.

It uses GRE tor me policy plane

Question 21

Refer to the exhibit. What is achieved by this Python script?

Options:

A.

It configures access list statements

B.

It reads access list statements into a dictionary list

C.

It displays access list statements on a terminal screen.

D.

It converts access list statements to a human-readable format.

Question 22

Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?

Options:

A.

ingress tunnel router

B.

map resolver

C.

egress tunnel router

D.

map server

Question 23

Which tag defines the roaming domain and properties of an AP deployment?

Options:

A.

RF tag

B.

policy tag

C.

site tag

D.

AP tag

Question 24

Which device makes the decision for a wireless client to roam?

Options:

A.

wireless client

B.

Wireless LAN controller

C.

access point

D.

WCS location server

Question 25

What is a characteristic of Layer 3 roaming?

Options:

A.

Clients must obtain a new IP address when they roam between APs.

B.

It provides seamless roaming between APs that are connected to different Layer 3 networks and different mobility groups.

C.

It is only supported on controllers that run SSO.

D.

It provides seamless client roaming between APs in different Layer 3 networks but within the same mobility group.

Question 26

Which controller is the single plane of management for Cisco SD-WAN?

Options:

A.

vBond

B.

vEdge

C.

vSmart

D.

vManage

Question 27

What is the name of the numerical relationship of the wireless signal compared to the noise floor?

Options:

A.

SNR

B.

RSSI

C.

EIRP

D.

gain

Question 28

Refer to the exhibit. Which HTTP request produced the REST API response that was returned by the Cisco Catalyst Center (formerly DNA Center) platform?

Options:

A.

POST /auth/token

B.

GET /network-device

C.

GET /template-programmer/template/version/42a3df73-3ef4-49e2-b4f0-6927bbd4bf52

D.

POST /discovery

Question 29

Ascriptcontainsthe statement white loop != 999 ’ Which value terminates the loop?

Options:

A.

A value equal to 999.

B.

A value not equal to 999.

C.

A value greater than or equal to 999.

D.

A value less than or equal to 999.

Question 30

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

Options:

A.

A close up of a text AI-generated content may be incorrect.

B.

A close up of a logo AI-generated content may be incorrect.

C.

A close up of a text AI-generated content may be incorrect.

D.

A black text on a white background AI-generated content may be incorrect.

Question 31

Refer to the exhibit.

What does the snippet of code achieve?

Options:

A.

It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

B.

It opens a tunnel and encapsulates the login information, if the host key is correct.

C.

It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

D.

It creates an SSH connection using the SSH key that is stored, and the password is ignored.

Question 32

What does a next-generation firewall that is deployed at the data center protect against?

Options:

A.

signature-based malware

B.

DMZ web server vulnerabilities

C.

zero-day attacks

D.

DDoS

Question 33

What are two characteristics of Cisco Catalyst SD-WAN? (Choose two.)

Options:

A.

control plane operates over DTLS/TLS authenticated and secured tunnels

B.

time-consuming configuration and maintenance

C.

distributed control plane

D.

unified data plane and control plane

E.

centralized reachability, security, and application policies

Question 34

Which technology is the Cisco SD-Access control plane based on?

Options:

A.

IS-IS

B.

LISP

C.

Cisco TrustSec

D.

VXLAN

Question 35

What is the API keys option for REST API authentication?

Options:

A.

a credential that is transmitted unencrypted

B.

one-time encrypted token

C.

a username that is stored in the local router

D.

a predetermined string that is passed from client to server.

Question 36

A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?  

Options:

A.

host dependent  

B.

weighted

C.

least connection

D.

round robin

Question 37

Refer to the exhibit. An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required?

Options:

A.

Enable EAP parameters.

B.

Apply CISCO ISE default settings.

C.

Disable the RADIUS server accounting interim update.

D.

Select a RADIUS authentication server.

Question 38

Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity?

Options:

A.

802. 1d

B.

802.1x

C.

802.1q

D.

802.1w

Question 39

What is one advantage of using a data modeling language to develop an API client application?

Options:

A.

Increase in compatibility

B.

easier feature extensibility

C.

stronger security properties

D.

lower resource requirements

Question 40

Options:

Question 41

Options:

Question 42

Options:

Question 43

Options:

Question 44

Options:

Question 45

Options:

Question 46

Options:

Question 47

Options:

Question 48

Options:

Question 49

Options:

Question 50

Options:

Question 51

Options:

Question 52

Options:

Question 53

Options:

Question 54

Options:

Question 55

Options:

Question 56

Options:

Question 57

Options:

Question 58

Options:

Question 59

OR

Options:

Question 60

Options:

Question 61

Options:

Question 62

Options:

Question 63

Options:

Question 64

Options:

Question 65

Options:

Question 66

Options:

Question 67

Options:

Question 68

Options:

Demo: 68 questions
Total 258 questions