Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Cisco 350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Exam Practice Test

Page: 1 / 34
Total 335 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Question # 1

Question # 1

Options:

Question 2

Question # 2

Question # 2

Question # 2

Question # 2

Options:

Question 3

Question # 3

Question # 3

Options:

Question 4

Question # 4

Question # 4

Options:

Question 5

Question # 5

Question # 5

Options:

Question 6

Question # 6

Question # 6

Options:

Question 7

Question # 7

Question # 7

Options:

Question 8

Question # 8

Question # 8

Options:

Question 9

Question # 9

Question # 9

Options:

Question 10

Question # 10

Question # 10

Options:

Question 11

Question # 11

Question # 11

Options:

Question 12

Question # 12

Question # 12

Options:

Question 13

Question # 13

Options:

Question 14

Question # 14

Question # 14

Options:

Question 15

Question # 15

Question # 15

Options:

Question 16

Question # 16

Question # 16

Options:

Question 17

Question # 17

Question # 17

Options:

Question 18

Question # 18

Question # 18

Options:

Question 19

Question # 19

OR

Question # 19

Question # 19

Options:

Question 20

Question # 20

Question # 20

Options:

Question 21

Question # 21

Question # 21

Options:

Question 22

Question # 22

Question # 22

Question # 22

Options:

Question 23

Question # 23

Question # 23

Options:

Question 24

Question # 24

Question # 24

Options:

Question 25

Question # 25

Question # 25

Options:

Question 26

Question # 26

Question # 26

Question # 26

Options:

Question 27

Question # 27

Question # 27

Options:

Question 28

Question # 28

Question # 28

Options:

Question 29

Question # 29

Question # 29

Options:

Question 30

Which protocol is used by vmanage to push centralized policies to vsmart controllers?

Options:

A.

NETCONF

B.

TLS

C.

STUN

D.

OMP

Question 31

Which characteristic applies to Cisco SD-Access?

Options:

A.

It uses dynamic routing the discover and provision access switches.

B.

It uses VXLAN for the control plane

C.

It uses VXLAN for the data plane

D.

It uses dynamic routing to discover and provision border switches

Question 32

What is the structure of a JSON web token?

Options:

A.

header and payload

B.

three parts separated by dots: version, header, and signature

C.

payload and signature

D.

three parts separated by dots: header, payload. and signature

Question 33

Which method displays text directly into the active console with a synchronous EEM applet policy?

Options:

A.

event manager applet boom

event syslog pattern 'UP'

action 1.0 gets 'logging directly to console'

B.

event manager applet boom

event syslog pattern 'UP'

action 1.0 syslog priority direct msg 'log directly to console'

C.

event manager applet boom

event syslog pattern 'UP'

action 1.0 puts 'logging directly to console'

D.

event manager applet boom

event syslog pattern 'UP'

action 1.0 string 'logging directly to console'

Question 34

Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors?

Options:

A.

Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes.

B.

Each virtual machine requires a unique IP address but shares the MAC address with the physical server

C.

Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server.

D.

Each virtual machine requires a unique MAC address but shares the IP address with the physical server.

Question 35

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

•LocationA -72dBm

• Location B:-75 dBm

• Location C; -65 dBm

• Location D -80 dBm

Which two statements does the engineer use to explain these values to the customer? (Choose two.)

Options:

A.

The signal strength at location B is 10 dB better than location C.

B.

The signal strength at location C is too weak to support web surfing

C.

Location D has the strongest RF signal strength.

D.

The RF signal strength at location B is 50% weaker than location A.

E.

The RF signal strength at location C is 10 times stronger than location B

Question 36

Which function is performed by vSmart in the Cisco Catalyst SD-WAN architecture?

Options:

A.

facilitation of NAT detection and traversal

B.

redistribution between OMP and other routing protocols

C.

distribution of IPsec keys

D.

execution of localized policies

Question 37

Question # 37

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

Options:

A.

A close up of a text AI-generated content may be incorrect.

B.

A close up of a logo AI-generated content may be incorrect.

C.

A close up of a text AI-generated content may be incorrect.

D.

A black text on a white background AI-generated content may be incorrect.

Question 38

What is a characteristic of Layer 3 roaming?

Options:

A.

Clients must obtain a new IP address when they roam between APs.

B.

It provides seamless roaming between APs that are connected to different Layer 3 networks and different mobility groups.

C.

It is only supported on controllers that run SSO.

D.

It provides seamless client roaming between APs in different Layer 3 networks but within the same mobility group.

Question 39

Which technology reduces the implementation of STP and leverages both unicast and multicast?

Options:

A.

VLAN

B.

VXLAN

C.

VPC

D.

VSS

Question 40

Which AP mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?

Options:

A.

SE-connect mode

B.

sensor mode

C.

client mode

D.

sniffer mode

Question 41

Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used.

Question # 41

Options:

Question 42

Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.

Question # 42

Options:

Question 43

Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?

Options:

A.

ingress tunnel router

B.

map resolver

C.

egress tunnel router

D.

map server

Question 44

What are two benefits of using Cisco TrustSec? (Choose two.)

Options:

A.

unknown file analysis using sandboxing

B.

advanced endpoint protection against malware

C.

end-to-end traffic encryption

D.

simplified management of network access

E.

consistent network segmentation

Question 45

Question # 45

Refer to the exhibit. Which HTTP request produced the REST API response that was returned by the Cisco Catalyst Center (formerly DNA Center) platform?

Options:

A.

POST /auth/token

B.

GET /network-device

C.

GET /template-programmer/template/version/42a3df73-3ef4-49e2-b4f0-6927bbd4bf52

D.

POST /discovery

Question 46

Which technology is the Cisco SD-Access control plane based on?

Options:

A.

IS-IS

B.

LISP

C.

Cisco TrustSec

D.

VXLAN

Question 47

To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?

Options:

A.

security ft adaptive

B.

security wpa akm dotlx

C.

security wpa akm psk

D.

security wpa akm ft psk

Question 48

Which technology is the Cisco SD-Access control plane based on?

Options:

A.

LISP

B.

CTS

C.

SGT

D.

VRF

Question 49

Which data format can be used for an API request?

Options:

A.

HTML

B.

PERL

C.

JSON

D.

Python

Question 50

What is required for a VXLAN tunnel endpoint to operate?

Options:

A.

a VXLAN tunnel endpoint identifier

B.

at least one Layer 2 interface and one Layer 3 interlace

C.

at least one IP for the transit network and one IP for endpoint connectivity

D.

a VXLAN network identifier

Page: 1 / 34
Total 335 questions