Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cisco 350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Exam Practice Test

Demo: 83 questions
Total 361 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.

Options:

Question 2

Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.

Options:

A.

action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file"

B.

action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file"

C.

action 4.0 ens-event "show process cpu sorted | append flash:high-cpu-file"

D.

action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file"

Question 3

When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?

Options:

A.

Not all of the controllers in the mobility group are using the same mobility group name.

B.

All of the controllers within the mobility group are using the same virtual Interface IP address.

C.

Not all of the controllers within the mobility group are using the same virtual interface IP address.

D.

All of the controllers in the mobility group are using the same mobility group name

Question 4

Refer to the exhibit. What is achieved by this Python script?

Options:

A.

It configures access list statements

B.

It reads access list statements into a dictionary list

C.

It displays access list statements on a terminal screen.

D.

It converts access list statements to a human-readable format.

Question 5

Which device makes the decision for a wireless client to roam?

Options:

A.

wireless client

B.

Wireless LAN controller

C.

access point

D.

WCS location server

Question 6

Drag and drop the code snippets from the bottom onto the blanks in the Python script to convert a Python object into a JSON string. Not all options are used.

Options:

Question 7

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

Options:

A.

Cisco Firepower and FireSIGHT

B.

Cisco Stealth watch system

C.

Advanced Malware Protection

D.

Cisco Web Security Appliance

Question 8

A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described?

Options:

A.

intra-VLAN

B.

inter-controller

C.

intra-controller

D.

inter-subnet

Question 9

How does NETCONF YANG represent data structures?

Options:

A.

as strict data structures defined by RFC 6020

B.

in an XML tree format

C.

In an HTML format

D.

as modules within a tree

Question 10

What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?

Options:

A.

It facilitates software upgrades to network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It uses a predefined configuration through parameterized elements or variables.

D.

It provides a high-level overview of the health of every network device.

Question 11

In a wireless network environment, which measurement compares the received signal to the background noise?

Options:

A.

free space path loss

B.

link power budget

C.

fading

D.

SNR

Question 12

Which protocol does Cisco Catalyst Center (formerly DNA Center) SDK use to discover the topology of non-Cisco devices in a network?

Options:

A.

CDP

B.

LLDP

C.

Telnet

D.

SSH

Question 13

Drag and drop the threat defense solutions from the left onto their descriptions on the right.

Options:

Question 14

At which plane does vBond operate in Cisco SD-WAN solutions?

Options:

A.

control plane

B.

data plane

C.

orchestration plane

D.

management plane

Question 15

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

Options:

A.

RSSI

B.

SNR

C.

Noise

D.

CCI

Question 16

A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?  

Options:

A.

host dependent  

B.

weighted

C.

least connection

D.

round robin

Question 17

Refer to the exhibit.

What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

Options:

A.

A NETCONF request was made for a data model that does not exist.

B.

The device received a valid NETCONF request and serviced it without error.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

D.

The NETCONF running datastore is currently locked.

Question 18

Which antenna type should be used for a site-to-site wireless connection?

Options:

A.

omnidirectional

B.

patch

C.

dipole

D.

Yagi

Question 19

Which RF value represents the decline of the RF signal amplitude over a given distance"?

Options:

A.

signal-to-noise ratio

B.

received signal strength indicator

C.

free space path loss

D.

effective isotropic radiated power

Question 20

Which two sources cause interference for Wi-Fi networks? (Choose two.)

Options:

A.

incandescent lights

B.

DECT 6.0 cordless phone

C.

mirrored wall

D.

fish tank

E.

900MHz baby monitor

Question 21

Which solution supports end-to-end line-rate encryption between two sites?

Options:

A.

TrustSec

B.

MACsec

C.

IPsec

D.

GRE

Question 22

Which two pieces of information are necessary to compute SNR? (Choose two.)

Options:

A.

EIRP

B.

noise floor

C.

antenna gain

D.

RSSI

E.

transmit power

Question 23

Refer to the exhibit. The key value pairs must be extracted by iterating through a list of tuples. Which statement completes the snippet and prints each key value pair as a tuple?

Options:

A.

for device, value In device_ip.items(): print(device)

B.

for device in device_ip.items(): print(device)

C.

for device in device_ip.values(): print(device)

D.

for device in deviceip: print(device)

Question 24

A company recently decided to use RESTCONF instead of NETCONF. and many of their NETCONF scripts contain the operation (operation-create). Which RESTCONF operation must be used to replace these statements?

Options:

A.

CREATE

B.

POST

C.

GET

D.

PUT

Question 25

Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used.

Options:

Question 26

In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)

Options:

A.

advertisement of network prefixes and their attributes

B.

configuration of control and data policies

C.

gathering of underlay infrastructure data

D.

delivery of crypto keys

E.

segmentation and differentiation of traffic

Question 27

How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?

Options:

A.

Add a timestamp to the request in the API header.

B.

Use a password hash.

C.

Add OAuth to the request in the API header.

D.

Use HTTPS.

Question 28

To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?

Options:

A.

security ft adaptive

B.

security wpa akm dotlx

C.

security wpa akm psk

D.

security wpa akm ft psk

Question 29

In a campus network design, what are two benefits of using BFD for failure detection'? (Choose two.)

Options:

A.

BFD speeds up routing convergence time

B.

BFD provides path failure detection in less than a second

C.

BFD provides fault tolerance by enabling multiple routers to appear as a single virtual router

D.

BFD is an efficient way to reduce memory and CPU usage

E.

BFD enables network peers to continue forwarding packets in the event of a restart

Question 30

Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?

Options:

A.

ETR

B.

MS

C.

ITR

D.

MR

Question 31

Refer to the exhibit. An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required?

Options:

A.

Enable EAP parameters.

B.

Apply CISCO ISE default settings.

C.

Disable the RADIUS server accounting interim update.

D.

Select a RADIUS authentication server.

Question 32

Which two functions is an edge node responsible for? (Choose two.)

Options:

A.

provides multiple entry and exit points for fabric traffic

B.

provides the default exit point for fabric traffic

C.

provides the default entry point for fabric traffic

D.

provides a host database that maps endpoint IDs to a current location

E.

authenticates endpoints

Question 33

Which Cisco WLC feature allows a wireless device to perform a Layer 3 roam between two separate controllers without changing the client IP address?

Options:

A.

mobile IP

B.

mobility tunnel

C.

LWAPP tunnel

D.

GRE tunnel

Question 34

Reler to the exhibit. An engineer configuring WebAuth on a Cisco Catalyst 9000 Series WIC. The engineer has purchased a third-party certificate using the FQDN of the WLC as the CN and intends to use bit on the WebAuth splash page What must be configured so that the clients do not receive a certificate error?

Options:

A.

Virtual IPv4 Address must be set to a routable address.

B.

Virtual IPv4 Hostname must match the CN of the certificate.

C.

Trustpoint must be set to the management certificate of the WLC.

D.

Web Auth Intercept HTTPs must be enabled.

Question 35

Which feature works with SSO to continue forwarding packets after a route processor failure until the control plane recovers?

Options:

A.

ECMP

B.

HSRP

C.

RSVP

D.

NSF

Question 36

Which features does Cisco EDR use to provide threat detection and response protection?

Options:

A.

containment, threat intelligence, and machine learning

B.

firewalling and intrusion prevention

C.

container-based agents

D.

cloud analysts and endpoint firewall controls

Question 37

An engineer must configure a new 6 Ghz only SSID on a cisco catalyst 9800 series WLC, with these requirements:

Provide 802.11ax data rates for supported devices

All users authenticate using a certificate

Which wireless layer 2 security mode meets the requirements?

Options:

A.

WPA2 Enterprise

B.

WPA3 Personal

C.

WPA2 Personal

D.

WPA3 Enterprise

Question 38

A company hires a network architect to design a new OTT wireless solution within a Cisco SD-Access Fabric wired network. The architect wants to register access points to the WLC to centrally switch the traffic. Which AP mode must the design include?

Options:

A.

Bridge

B.

Fabric

C.

FlexConnect

D.

local

Question 39

Drag and drop the configuration management tools from the left onto the configuration styles they use on the right

Options:

Question 40

What is the primary responsibility of the vBond orchestrator?

Options:

A.

to provide centralized management and provisioning of all elements into the network

B.

to configure NAT communication on WAN Edge routers

C.

to provide configuration synchronization of an WAN Edge devices

D.

to facilitate start-up by performing authentication and authorization of all elements into the network

Question 41

What are two best practices when designing a campus Layer 3 infrastructure? (Choose two.)

Options:

A.

Summarize routes from the aggregation layer toward the core layer.

B.

Summarize from the access layer toward the aggregation layer.

C.

Configure passive-interface on nontransit links.

D.

Implement security features at the core.

E.

Tune Cisco Express Forwarding load balancing hash for ECMP routing.

Question 42

Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?

Options:

A.

All devices integrating with ISE

B.

selected individual devices

C.

all devices in selected sites

D.

all wired devices

Question 43

Refer to the exhibit. An engineer must adjust the configuration so that Router A becomes the active router. Which commands should be applied to router A? (Choose two)

Options:

A.

vrrp 1 priority 90

B.

vrrp 1 timers advertise 1

C.

vrrp lip 10.1.0.11

D.

ip address 10.1.0.11 255.0.0.0

E.

vrrp 1 priority 120

Question 44

What is the purpose of data modeling languages?

Options:

A.

to describe a data schema convertible into any data encoding format

B.

to specify algorithms necessary to decode binary-encoded protocol data units

C.

to translate encoded data for interoperability between different CPU architectures

D.

to provide a framework to describe data flow patterns in networks

Question 45

Refer to the exhibit. What is output by this code?

Options:

A.

012345

B.

(0.5)

C.

05

D.

01234

Question 46

In a fabric-enabled wireless network, which device is responsible for maintaining the endpoint ID database?

Options:

A.

fabric border node

B.

fabric edge node

C.

fabric wireless controller

D.

control plane node

Question 47

Which method is used by an AP to join HA controllers and is configured in NVRAM?

Options:

A.

Primary/Secondary- Tertiary/Backup

B.

stored WLC information

C.

DNS

D.

IP Helper Addresses

Question 48

Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.

Options:

Question 49

Which method requires a client to authenticate and has the capability to function without encryption?

Options:

A.

open

B.

WEP

C.

WebAuth

D.

PSK

Question 50

Which action reduces sticky clients in dense RF environments?

Options:

A.

Decrease radio channel widths to 40 MHz.

B.

Increase the mandatory minimum data rates.

C.

Decrease the mandatory minimum data rates.

D.

Increase radio channel widths to 160 MHz.

Question 51

Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.

Options:

Question 52

Why does the vBond orchestrator have a public IP?

Why does the vBond orchestrator have a public IP?

Options:

A.

to enable vBond to learn the public IP of WAN Edge devices that are behind NAT gateways or in private address space

B.

to facilitate downloading and distribution of operational and security patches

C.

to allow for global reachability from all WAN Edges in the Cisco SD-WAN and to facilitate NAT traversal

D.

to provide access to Cisco Smart Licensing servers for license enablement

Question 53

Which solution supports end to end line-rate encryption between two sites?

Options:

A.

IPsec

B.

TrustSec

C.

MACSec

D.

GRE

Question 54

An engineer must protect their company against ransom ware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?

Options:

A.

Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation.

B.

Use Cisco AMP deployment with the Malicious Activity Protection engine enabled.

C.

Use Cisco AMP deployment with the Exploit Prevention engine enabled.

D.

Use Cisco Firepower and block traffic to TOR networks.

Question 55

Options:

Question 56

Options:

Question 57

Options:

Question 58

Options:

Question 59

Options:

Question 60

Options:

Question 61

Options:

Question 62

Options:

Question 63

Options:

Question 64

Options:

Question 65

Options:

Question 66

Options:

Question 67

Options:

Question 68

Options:

Question 69

Options:

Question 70

Options:

Question 71

Options:

Question 72

Options:

Question 73

Options:

Question 74

Options:

Question 75

Options:

Question 76

Options:

Question 77

Options:

Question 78

Options:

Question 79

Options:

Question 80

Options:

Question 81

Options:

Question 82

Options:

Question 83

OR

Options:

Demo: 83 questions
Total 361 questions