Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Cisco 350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Exam Practice Test

Page: 1 / 36
Total 361 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Question # 1

Question # 1

Question # 1

Question # 1

Options:

Question 2

Question # 2

Question # 2

Options:

Question 3

Question # 3

Question # 3

Options:

Question 4

Question # 4

Question # 4

Options:

Question 5

Question # 5

Question # 5

Options:

Question 6

Question # 6

Question # 6

Options:

Question 7

Question # 7

Question # 7

Options:

Question 8

Question # 8

Question # 8

Options:

Question 9

Question # 9

Question # 9

Options:

Question 10

Question # 10

Question # 10

Question # 10

Options:

Question 11

Question # 11

Question # 11

Question # 11

Options:

Question 12

Question # 12

Question # 12

Options:

Question 13

Question # 13

Question # 13

Options:

Question 14

Question # 14

Question # 14

Options:

Question 15

Question # 15

Question # 15

Options:

Question 16

Question # 16

Options:

Question 17

Question # 17

Question # 17

Options:

Question 18

Question # 18

Question # 18

Options:

Question 19

Question # 19

Question # 19

Options:

Question 20

Question # 20

Question # 20

Options:

Question 21

Question # 21

Question # 21

Options:

Question 22

Question # 22

Question # 22

Options:

Question 23

Question # 23

Question # 23

Options:

Question 24

Question # 24

Question # 24

Options:

Question 25

Question # 25

Question # 25

Options:

Question 26

Question # 26

Question # 26

Options:

Question 27

Question # 27

OR

Question # 27

Question # 27

Options:

Question 28

Question # 28

Question # 28

Options:

Question 29

Question # 29

Question # 29

Options:

Question 30

A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violates Which term refers to this REST security design principle?

Options:

A.

economy of mechanism

B.

complete mediation

C.

separation of privilege

D.

least common mechanism

Question 31

Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.

Question # 31

Options:

Question 32

Which three methods does Cisco DNA Centre use to discover devices? (Choose three)

Options:

A.

CDP

B.

SNMP

C.

LLDP

D.

ping

E.

NETCONF

F.

a specified range of IP addresses

Question 33

Which technology is the Cisco SD-Access control plane based on?

Options:

A.

IS-IS

B.

LISP

C.

Cisco TrustSec

D.

VXLAN

Question 34

Which method ensures the confidentiality of data exchanged over a REST API?

Options:

A.

Use TLS to secure the underlying HTTP session.

B.

Use me POST method Instead or URL-encoded GET to pass parameters.

C.

Deploy digest-based authentication to protect the access to the API.

D.

Encode sensitive data using Base64 encoding.

Question 35

Question # 35

Assuming the WLC's interfaces are not in the same subnet as the RADIUS server, which interface would the WLC use as the source for all RADIUS-related traffic?

Options:

A.

the interface specified on the WLAN configuration

B.

any interface configured on the WLC

C.

the controller management interface

D.

the controller virtual interface

Question 36

What does the statement print(format(0.8, \0%')) display?

Options:

A.

80%

B.

8.8%

C.

.08%

D.

8%

Question 37

What are two best practices when designing a campus Layer 3 infrastructure? (Choose two.)

Options:

A.

Summarize routes from the aggregation layer toward the core layer.

B.

Summarize from the access layer toward the aggregation layer.

C.

Configure passive-interface on nontransit links.

D.

Implement security features at the core.

E.

Tune Cisco Express Forwarding load balancing hash for ECMP routing.

Question 38

Question # 38

Refer to the exhibit An engineer is troubleshooting an issue with non-Wi-Fi interference on the 5-GHz band The engineer has enabled Cisco CleanAir and set the appropriate traps, but the AP does not change the channel when it detects significant interference Which action will resolve the issue?

Options:

A.

Enable the Avoid Persistent Non-WiFi Interference option

B.

Disable the Avoid Foreign AP Interference option.

C.

Change the DCA Sensitivity option to High

D.

Enable the Event Driven Radio Resource Management option

Question 39

Which component transports data plane traffic across a Cisco SD-WAN network?

Options:

A.

vSmart

B.

vManage

C.

cEdge

D.

vBond

Question 40

Which method is used by an AP to join HA controllers and is configured in NVRAM?

Options:

A.

Primary/Secondary- Tertiary/Backup

B.

stored WLC information

C.

DNS

D.

IP Helper Addresses

Question 41

Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used

Question # 41

Options:

Question 42

What is one main REST security design principle?

Options:

A.

separation of privilege

B.

password hashing

C.

confidential algorithms

D.

OAuth

Question 43

What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?

Options:

A.

broadcast discover request

B.

join request to all the WLCs

C.

unicast discovery request to each WLC

D.

Unicast discovery request to the first WLS that resolves the domain name

Question 44

Which method does FastLocate use to collect location-based information?

Options:

A.

RFID

B.

client probing

C.

beacons

D.

data packets

Question 45

Which type of API enables Cisco Catalyst Center (formerly DNA Center) to focus on outcome instead of the individual steps that are required to achieve the outcome?

Options:

A.

southbound Multivendor Support

B.

westbound Integration

C.

northbound Intent

D.

eastbound Events and Notifications

Question 46

Which next generation firewall feature supports separate security services for multiple departments?

Options:

A.

state sharing mode to .trade the user data sessions and replication to the neighbor firewall using a failover link

B.

Layer 3 mode with resource tracking capabilities and automatic configuration synchronization between the nodes and security zones

C.

multicontext mode with specific logical or physical interface allocation within each context and grouped into security zones

D.

virtual switch mode to provide traffic inspection capabilities for the flows entering the firewall and dropping packets based on policy configuration

Question 47

What is one characteristic of Cisco Catalyst Center (formerly DNA Center) and vManage northbound APIs?

Options:

A.

They implement the NETCONF protocol.

B.

They push configuration changes down to devices.

C.

They exchange XML-formatted content.

D.

They implement the RESTCONF protocol.

Question 48

Which method requires a client to authenticate and has the capability to function without encryption?

Options:

A.

open

B.

WEP

C.

WebAuth

D.

PSK

Question 49

What is a Type 1 hypervisor?

Options:

A.

runs directly on a physical server and depends on a previously installed operating system

B.

runs directly on a physical server and includes its own operating system

C.

runs on a virtual server and depends on an already installed operating system

D.

run on a virtual server and includes its own operating system.

Question 50

With IGMPv2, which multicast group address does the IGMP querier use to send query messages to all hosts on the LAN?

Options:

A.

239.0.0.2

B.

224.0.0.1

C.

239.0.0.1

D.

224.0.0.2

Question 51

What are two characteristics of Cisco Catalyst SD-WAN? (Choose two.)

Options:

A.

control plane operates over DTLS/TLS authenticated and secured tunnels

B.

time-consuming configuration and maintenance

C.

distributed control plane

D.

unified data plane and control plane

E.

centralized reachability, security, and application policies

Question 52

Which two sources cause interference for Wi-Fi networks? (Choose two.)

Options:

A.

incandescent lights

B.

DECT 6.0 cordless phone

C.

mirrored wall

D.

fish tank

E.

900MHz baby monitor

Question 53

Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.

Question # 53

Options:

Question 54

To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?

Options:

A.

security ft adaptive

B.

security wpa akm dotlx

C.

security wpa akm psk

D.

security wpa akm ft psk

Page: 1 / 36
Total 361 questions