Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Exam Practice Test

Page: 1 / 39
Total 393 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Question # 1

Question # 1

Options:

Question 2

Question # 2

OR

Question # 2

Question # 2

Options:

Question 3

Question # 3

Question # 3

Options:

Question 4

Question # 4

Question # 4

Options:

Question 5

Question # 5

Question # 5

Options:

Question 6

Question # 6

Question # 6

Question # 6

Options:

Question 7

Question # 7

Question # 7

Options:

Question 8

Question # 8

Question # 8

Options:

Question 9

Question # 9

Question # 9

Options:

Question 10

Question # 10

Options:

Question 11

Question # 11

Question # 11

Options:

Question 12

Question # 12

Question # 12

Options:

Question 13

Question # 13

Question # 13

Options:

Question 14

Question # 14

Question # 14

Options:

Question 15

Question # 15

Question # 15

Options:

Question 16

Question # 16

Question # 16

Options:

Question 17

Question # 17

Question # 17

Options:

Question 18

Question # 18

Question # 18

Options:

Question 19

Question # 19

Question # 19

Options:

Question 20

Question # 20

Question # 20

Question # 20

Question # 20

Options:

Question 21

Question # 21

Question # 21

Options:

Question 22

Question # 22

Question # 22

Options:

Question 23

Question # 23

Question # 23

Options:

Question 24

Question # 24

Question # 24

Options:

Question 25

Question # 25

Question # 25

Options:

Question 26

Question # 26

Question # 26

Question # 26

Options:

Question 27

Question # 27

Question # 27

Options:

Question 28

Question # 28

Question # 28

Options:

Question 29

Question # 29

Question # 29

Options:

Question 30

Question # 30

Refer to the exhibit. What is the value of the variable list after the code is run?

Options:

A.

[1, 2, 10]

B.

[1, 2, 3, 10]

C.

[1, 2, 10, 4]

D.

[1, 10, 10, 10]

Question 31

A response code of 404 is received while using the REST API on Cisco UNA Center to POST to this URI.

/dna/intent/api/v1 /template-programmer/project

What does the code mean?

Options:

A.

The client made a request a resource that does not exist.

B.

The server has not implemented the functionality that is needed to fulfill the request.

C.

The request accepted for processing, but the processing was not completed.

D.

The POST/PUT request was fulfilled and a new resource was created, Information about the resource is in the response body.

Question 32

An engineer is reviewing a PCAP file that contains a packet capture of a four-way handshake exchange between a dient and AP using WPA2 Enterprise Which EAPOL message validates and confirms that the client device has successfully Installed the GTK?

Options:

A.

M4-Message

B.

M3-Message

C.

M2-Message

D.

M1-Message

Question 33

Which tag defines the properties to be applied to each specific WLAN?

Options:

A.

RF tag

B.

policy tag

C.

AP tag

D.

site tag

Question 34

Question # 34

Refer to the exhibit. Based on this JSON response:

Question # 34

Which Python statement parses the response and prints "10:42:36.111 UTC Mon Jan 1 2024"?

Question # 34

Options:

A.

printfresponset[jsonrpc'][‘body’]['simple_time'])

B.

print(response[result'][0][,simple_time,])

C.

printfresponsefresult'Jfbody'JfsimpleJime'])

D.

printfresponsel'body'jrsimplejime'])

Question 35

Which technology is the Cisco SD-Access control plane based on?

Options:

A.

IS-IS

B.

LISP

C.

Cisco TrustSec

D.

VXLAN

Question 36

Which language can be used to model configuration and state data?

Options:

A.

JSON

B.

XML

C.

XDR

D.

YANG

Question 37

Which configuration enables a Cisco router lo send information to a TACACS+ server for individual EXEC commands associated with privilege level 15?

Options:

A.

Router(config)# aaa accounting commands 15 default start-stop group tacacs+

B.

Router(config)# aaa authorization exec default group tacacs+

C.

Router(config)# aaa authorization commands 15 default group tacacs+

D.

Router(config)# aaa accounting exec default start-stop group tacacs+

Question 38

Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)

Options:

A.

integrated intrusion prevention

B.

VPN

C.

application-level inspection

D.

stateful packet inspection

E.

NAT

Question 39

What is a benefit of YANG modules?

Options:

A.

tightly coupled models with encoding to improve performance

B.

easier multivendor interoperability provided by common or industry models

C.

avoidance of ecosystem fragmentation by having fixed modules that cannot be changed

D.

single protocol and model coupling to simplify maintenance and support

Question 40

Which two operational modes enable an AP to scan one or more wireless channels for rogue access points and at the same time provide wireless services to clients? (Choose two.)

Options:

A.

local

B.

rogue detector

C.

monitor

D.

FlexConnect

E.

sniffer

Question 41

Question # 41

Refer to the exhibit. Drag and drop the snippets into the RESTCONF request to form the request that returns this response. Not all options are used.

Question # 41

Options:

Question 42

Which technology is the Cisco SD-Access control plane based on?

Options:

A.

LISP

B.

CTS

C.

SGT

D.

VRF

Question 43

Question # 43

What is the JSON syntax that is formed from the data?

Options:

A.

Make”:‘Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}

B.

'Make ”: “Gocar1, “Model”: “Zoom”, “Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]

C.

{“Make”: Gocar, “Model": Zoom, “Features": Power Windows, Manual Drive, Auto AC}

D.

(“Make”:[ “Gocar”, “Model": “Zoom"], Features”: [“Power Windows", “Manual Drive", “Auto AC”]}

Question 44

Question # 44

Refer to the exhibit. Running the script causes the output in the exhibit. What should be the first line of the script?

Options:

A.

import manager

B.

ncclient manager import

C.

from ncclient import *

D.

from ncclient import manager

Question 45

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

•LocationA -72dBm

• Location B:-75 dBm

• Location C; -65 dBm

• Location D -80 dBm

Which two statements does the engineer use to explain these values to the customer? (Choose two.)

Options:

A.

The signal strength at location B is 10 dB better than location C.

B.

The signal strength at location C is too weak to support web surfing

C.

Location D has the strongest RF signal strength.

D.

The RF signal strength at location B is 50% weaker than location A.

E.

The RF signal strength at location C is 10 times stronger than location B

Question 46

Which two actions are recommended as security best practices to protect REST API? (Choose two.)

Options:

A.

Use SSL for encryption.

B.

Enable out-of-band authentication.

C.

Enable dual authentication of the session.

D.

Use TACACS+ authentication.

E.

Use a password hash.

Question 47

Refer to the exhibit.

Question # 47

An engineer attempts to connect to another device from Route1’s console port. Which configuration is needed to allow telnet connections?

Question # 47

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 48

Drag and drop the snippets onto the blanks within the code to create an EEM script that adds an entry to a locally stored text file with a timestamp when a configuration change is made. Not all options are used.

Question # 48

Options:

Question 49

What is the measure of the difference between the received signal and the noise floor in a wireless environment?

Options:

A.

XOR

B.

RSSI

C.

RRM

D.

SNR

Question 50

Question # 50

Refer to the exhibit. What is achieved by this Python script?

Options:

A.

It displays the output from show lldp neighbors into a standard output.

B.

It reads the neighbor count from show lldp neighbors into a dictionary list.

C.

It displays the Layer 3 neighbors from show lldp neighbors on the terminal screen.

D.

It reads the output from show lldp neighbors into an array object.

Question 51

Drag and drop the code snippets from the bottom onto the blanks in the Python script to print the device model to the screen and write JSON data to a file. Not all options are used

Question # 51

Options:

Question 52

A customer requires their wireless data traffic to egress at the switch port of the access point. Which access point mode supports this?

Options:

A.

Bridge

B.

Sniffer

C.

FlexConnect

D.

Monitor

Question 53

Which feature works with SSO to continue forwarding packets after a route processor failure until the control plane recovers?

Options:

A.

ECMP

B.

HSRP

C.

RSVP

D.

NSF

Question 54

Which Cisco Catalyst SD-WAN component is responsible for distributing data plane traffic policies?

Options:

A.

vBond

B.

vManage

C.

vSmart

D.

WAN edge

Question 55

What happens when a FlexConnect AP changes to standalone mode?

Options:

A.

All client roaming continues to work.

B.

All controller-dependent activities stop working except the DFS.

C.

Only clients on central switching WLANs stay connected.

D.

All clients on all WLANs are disconnected.

Question 56

A company recently decided to use RESTCONF instead of NETCONF. and many of their NETCONF scripts contain the operation (operation-create). Which RESTCONF operation must be used to replace these statements?

Options:

A.

CREATE

B.

POST

C.

GET

D.

PUT

Question 57

What is used by vManage to interact withCiscoSD-WAN devices in the fabric?

Options:

A.

northbound API

B.

RESTCONF

C.

Southbound API

D.

IPsec

Question 58

Which three methods does Cisco Catalyst Center (formerly DNA Center) use to discover devices? (Choose three.)

Options:

A.

SNMP

B.

a specified range of IP addresses

C.

NETCONF

D.

LLDP

E.

ping

F.

CDP

Question 59

A corporate policy mandates that a certificate-based authentication system must be implemented on the wireless infrastructure. All corporate clients will contain a certificate that will be used in conjunction with ISE and user credentials to perform authentication before the clients are allowed to connect to the corporate Wi-Fi. Which authentication key option must be selected to ensure that this authentication can take place?

Options:

A.

none

B.

PSK

C.

802.1x

D.

CCKM

Page: 1 / 39
Total 393 questions