Big Halloween Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Exam Practice Test

Page: 1 / 38
Total 380 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Which API does Cisco DNA Center use to retrieve information about images?

Options:

A.

SWIM

B.

Img-Mgmt

C.

PnP

D.

Client Health

Question 2

Question # 2

Refer to the exhibit. What is the output of this code?

Question # 2

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 3

Which DNS record type is needed to allow a Cisco AP to discover a WLC when using IPv4?

Options:

A.

CNAME record

B.

A record

C.

NS record

D.

SOA record

Question 4

Which deployment option of Cisco NGFW provides scalability?

Options:

A.

tap

B.

inline tap

C.

high availability

D.

clustering

Question 5

Drag and drop the automation characteristics from the left to the corresponding tools on the right.

Question # 5

Options:

Question 6

What is the role of the vSmart controller in a Cisco Catalyst SD-WAN environment?

Options:

A.

It is the centralized network management system.

B.

It manages the data plane.

C.

It manages the control plane.

D.

It performs authentication and authorization.

Question 7

Question # 7

Refer to the exhibit. An engineer builds an EEM script to apply an access list. Which statement must be added to complete the script?

Options:

A.

event none

B.

action 6.0 cli command "ip access-list extended 101"

C.

action 2.1 cli command "ip access-list extended 101"

D.

action 3.1 cli command "ip access-list extended 101"

Question 8

Question # 8

Reler to the exhibit. An engineer configuring WebAuth on a Cisco Catalyst 9000 Series WIC. The engineer has purchased a third-party certificate using the FQDN of the WLC as the CN and intends to use bit on the WebAuth splash page What must be configured so that the clients do not receive a certificate error?

Options:

A.

Virtual IPv4 Address must be set to a routable address.

B.

Virtual IPv4 Hostname must match the CN of the certificate.

C.

Trustpoint must be set to the management certificate of the WLC.

D.

Web Auth Intercept HTTPs must be enabled.

Question 9

Question # 9

Refer to the exhibit. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?

Options:

A.

event manager applet EEM_IP_SLAevent track 10 state down

B.

event manager applet EEM_IP_SLAevent sla 10 state unreachable

C.

event manager applet EEM_IP_SLAevent sla 10 state down

D.

event manager applet EEM_IP_SLAevent track 10 state unreachable

Question 10

When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?

Options:

A.

Not all of the controllers in the mobility group are using the same mobility group name.

B.

All of the controllers within the mobility group are using the same virtual Interface IP address.

C.

Not all of the controllers within the mobility group are using the same virtual interface IP address.

D.

All of the controllers in the mobility group are using the same mobility group name

Question 11

Which feature is needed to maintain the IP address of a client when an inter-controller Layer 3 roam is performed between two WLCs that are using different mobility groups?

Options:

A.

interface groups

B.

RF groups

C.

AAA override

D.

auto anchor

Question 12

In a wireless network environment, which measurement compares the received signal to the background noise?

Options:

A.

free space path loss

B.

link power budget

C.

fading

D.

SNR

Question 13

An engineer is reviewing a PCAP file that contains a packet capture of a four-way handshake exchange between a dient and AP using WPA2 Enterprise Which EAPOL message validates and confirms that the client device has successfully Installed the GTK?

Options:

A.

M4-Message

B.

M3-Message

C.

M2-Message

D.

M1-Message

Question 14

Which data is properly formatted with JSON?

Question # 14

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 15

Why does the vBond orchestrator have a public IP?

Why does the vBond orchestrator have a public IP?

Options:

A.

to enable vBond to learn the public IP of WAN Edge devices that are behind NAT gateways or in private address space

B.

to facilitate downloading and distribution of operational and security patches

C.

to allow for global reachability from all WAN Edges in the Cisco SD-WAN and to facilitate NAT traversal

D.

to provide access to Cisco Smart Licensing servers for license enablement

Question 16

Which type of tunnel is required between two WLCs to enable intercontroller roaming?

Options:

A.

LWAPP

B.

CAPWAP

C.

IPsec

D.

mobility

Question 17

What is a Type 1 hypervisor?

Options:

A.

runs directly on a physical server and depends on a previously installed operating system

B.

runs directly on a physical server and includes its own operating system

C.

runs on a virtual server and depends on an already installed operating system

D.

run on a virtual server and includes its own operating system.

Question 18

What is a characteristic of VXLAN?

Options:

A.

It extends Layers 2 and Layer 3 overlay network over a Layer 2 underly.

B.

It has a 12-byte packet header.

C.

Its frame encapsulation is performed by MAC-in-UDP.

D.

It uses TCP for transport

Question 19

What is the function of an intermediate node in a Cisco SD-Access fabric?

Options:

A.

to route packets within the fabric based on the Layer 3 information in the header

B.

to provide an entry and exit point between the fabric and external resources

C.

to encapsulate and de-encapsulate packets with a VXLAN header

D.

to provide reachability between fabric clients and nonfabric clients on the same subnet

Question 20

What is the name of the numerical relationship of the wireless signal compared to the noise floor?

Options:

A.

SNR

B.

RSSI

C.

EIRP

D.

gain

Question 21

A customer has several small branches and wants to deploy a Wi-Fi solution with local management using CAPWAP. Which deployment model meets this requirement?

Options:

A.

local mode

B.

SD-Access wireless

C.

autonomous

D.

Mobility Express

Question 22

Question # 22

Refer to the exhibit A network engineer must use a Python script lo convert data received from a network device. Which type of data is printed to the console when the script runs?

Options:

A.

dictionary with a key-value pair

B.

list of lists

C.

list of strings

D.

tuple list

Question 23

How is a data modelling language used?

Options:

A.

To enable data to be easily structured grouped validated and replicated

B.

To represent finite and well-defined network elements that cannot be changed

C.

To model the flows of unstructured data within the infrastructure

D.

To provide human readability to scripting languages

Question 24

What is a benefit of YANG modules?

Options:

A.

tightly coupled models with encoding to improve performance

B.

easier multivendor interoperability provided by common or industry models

C.

avoidance of ecosystem fragmentation by having fixed modules that cannot be changed

D.

single protocol and model coupling to simplify maintenance and support

Question 25

Why is a Type 1 hypervisor more efficient than a Type 2 hypervisor?

Options:

A.

Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques.

B.

Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS.

C.

Type 1 hypervisor enables other operating systems to run on it.

D.

Type 1 hypervisor relies on the existing OS of the host machine to access CPU, memory, storage, and network resources.

Question 26

Which two Cisco SD-Access components provide communication between traditional network elements and the controller layer? (Choose two.)

Options:

A.

network underlay

B.

network control platform

C.

network data platform

D.

partner ecosystem

E.

fabric overlay

Question 27

Which AP mode allows an engineer to scan configured channels for rogue access points?

Options:

A.

sniffer

B.

monitor

C.

bridge

D.

local

Question 28

Which AP mode analyzes the spectrum to detect sources of interference?

Options:

A.

Monitor

B.

Rogue detector

C.

SE-Connect

D.

Sniffer

Question 29

Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two.)

Options:

A.

custom headers

B.

authentication

C.

authorization

D.

request management

E.

accounting

Question 30

Which WLC discovery method uses CISCO-CAPWAP-CONTROLLER as an identifier?

Options:

A.

static configuration

B.

DHCP

C.

L3 broadcast

D.

DNS

Question 31

Which feature allows clients to perform Layer 2 roaming between wireless controllers?

Options:

A.

SSO

B.

N+1 high availably

C.

mobility groups

D.

RF grouping

Question 32

In a Cisco SD-Access wireless architecture, which device manages endpoint ID to edge node bindings?

Options:

A.

fabric control plane node

B.

fabric edge node

C.

fabric border node

D.

fabric wireless controller

Question 33

Which solution should be used in a high-density wireless environment to increase bandwidth for each user?

Options:

A.

Increase antenna size.

B.

Increase the cell size of each AP.

C.

Increase the mandatory minimum data rate.

D.

Increase TX power.

Question 34

What is contained in the VXLAN header?

Options:

A.

original Layer 2 VLAN ID

B.

Endpoint ID

C.

VXLAN network identifier

D.

source and destination RLOC ID

Question 35

Question # 35

Refer to the exhibit. Drag and drop the snippets into the RESTCONF request to form the request that returns this response. Not all options are used.

Question # 35

Options:

Question 36

What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?

Options:

A.

real-time threat management to stop DDoS attacks to the core and access networks

B.

malware control

C.

real-time awareness of users, devices, and traffic on the network

D.

dynamic threat control for web traffic 

Question 37

A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?  

Options:

A.

host dependent  

B.

weighted

C.

least connection

D.

round robin

Question 38

Drag and drop the characteristics from the left onto the corresponding orchestration tool on the right.

Question # 38

Options:

Question 39

In which forms can Cisco Catalyst SD-WAN routers be deployed at the perimeter of a site to provide SD-WAN services?

Options:

A.

virtualized instances

B.

hardware, software, cloud, and virtualized instances

C.

hardware, virtualized. and cloud instances

D.

hardware and virtualized instances

Question 40

Question # 40

Refer to the exhibit. Based on this JSON response:

Question # 40

Which Python statement parses the response and prints "10:42:36.111 UTC Mon Jan 1 2024"?

Question # 40

Options:

A.

printfresponset[jsonrpc'][‘body’]['simple_time'])

B.

print(response[result'][0][,simple_time,])

C.

printfresponsefresult'Jfbody'JfsimpleJime'])

D.

printfresponsel'body'jrsimplejime'])

Question 41

What happens when a FlexConnect AP changes to standalone mode?

Options:

A.

All client roaming continues to work.

B.

All controller-dependent activities stop working except the DFS.

C.

Only clients on central switching WLANs stay connected.

D.

All clients on all WLANs are disconnected.

Question 42

What is one primary REST security design principle?

Options:

A.

fail-safe defaults

B.

password hash

C.

adding a timestamp in requests

D.

OAuth

Question 43

Which two protocols are used with YANG data models? (Choose two.)

Options:

A.

NETCONF

B.

RESTCONF

C.

SSH

D.

TLS

E.

HTTPS

Question 44

A customer has two Cisco WLCs that manage separate APs throughout a building. Each WLC advertises the same SSID but terminates on different interfaces. Users report that they drop their connections and change IP addresses when roaming. Which action resolves this issue?

Options:

A.

Enable client load balancing

B.

Enable fast roaming.

C.

Configure high availability.

D.

Configure mobility groups.

Question 45

What is YANG used for?

Options:

A.

scraping data via CLI

B.

processing SNMP read-only polls

C.

describing data models

D.

prowling a transport for network configuration data between client and server

Question 46

Which method displays text directly into the active console with a synchronous EEM applet policy?

Options:

A.

event manager applet boomevent syslog pattern 'UP'action 1.0 gets 'logging directly to console'

B.

event manager applet boomevent syslog pattern 'UP'action 1.0 syslog priority direct msg 'log directly to console'

C.

event manager applet boomevent syslog pattern 'UP'action 1.0 puts 'logging directly to console'

D.

event manager applet boomevent syslog pattern 'UP'action 1.0 string 'logging directly to console'

Question 47

Which two functions is an edge node responsible for? (Choose two.)

Options:

A.

provides multiple entry and exit points for fabric traffic

B.

provides the default exit point for fabric traffic

C.

provides the default entry point for fabric traffic

D.

provides a host database that maps endpoint IDs to a current location

E.

authenticates endpoints

Question 48

What is used to measure the total output energy of a Wi-Fi device?

Options:

A.

dBi

B.

EIRP

C.

mW

D.

dBm

Question 49

Which technique is used to protect end user devices and data from unknown file behavior?

Options:

A.

crypto file ransomware protection using a file hash calculation

B.

file retrospection using continuous scan and analyses

C.

phishing file quarantine using an internal environment to store attached files

D.

file sandboxing using a protected environment to analyze and simulate the behavior of unknown files

Question 50

In a high-density AP environment, which feature can be used to reduce the RF cell size and not demodulate radio packets above a given threshold?

Options:

A.

RX-SOP

B.

FRA

C.

80211k

D.

RRM

Question 51

What is a TLOC in a Cisco SD-WAN deployment?

Options:

A.

value that identifies a specific tunnel within the Cisco SD-WAN overlay

B.

identifier that represents a specific service offered by nodes within the Cisco SD-WAN overlay

C.

attribute that acts as a next hop for network prefixes

D.

component set by the administrator to differentiate similar nodes that offer a common service

Question 52

Which device makes the decision for a wireless client to roam?

Options:

A.

wireless client

B.

Wireless LAN controller

C.

access point

D.

WCS location server

Question 53

Which unit measures the power of a radio signal with reference to 1 milliwatt?

Options:

A.

dBi

B.

mW

C.

dBw

D.

dBm

Question 54

Drag and drop the wireless elements on the left to their definitions on the right.

Question # 54

Options:

Question 55

A company recently decided to use RESTCONF instead of NETCONF. and many of their NETCONF scripts contain the operation (operation-create). Which RESTCONF operation must be used to replace these statements?

Options:

A.

CREATE

B.

POST

C.

GET

D.

PUT

Question 56

In a Cisco SD-Access network architecture, which access layer cabling design is optimal for the underlay network?

Options:

A.

Switches are cross-finned at the same layer and have a single connection to each upstream distribution device

B.

Switches are connected to each upstream distribution and core device.

C.

Switches are connected to each upstream distribution device.

D.

Switches are cross-linked to devices at the same layer and at the upstream and downstream devices.

Question 57

Question # 57

Refer to the exhibit. Which python code snippet prints the descriptions of disabled interface only?

Question # 57

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 58

Question # 58

Question # 58

Options:

Question 59

Question # 59

Question # 59

Options:

Question 60

Question # 60

Question # 60

Options:

Question 61

Question # 61

Question # 61

Options:

Question 62

Question # 62

Question # 62

Options:

Question 63

Question # 63

Question # 63

Options:

Question 64

Question # 64

Question # 64

Options:

Question 65

Question # 65

Question # 65

Options:

Question 66

Question # 66

Question # 66

Options:

Question 67

Question # 67

Question # 67

Question # 67

Options:

Question 68

Question # 68

Question # 68

Question # 68

Question # 68

Options:

Question 69

Question # 69

Question # 69

Options:

Question 70

Question # 70

Question # 70

Options:

Question 71

Question # 71

Question # 71

Options:

Question 72

Question # 72

Question # 72

Question # 72

Options:

Question 73

Question # 73

OR

Question # 73

Question # 73

Options:

Question 74

Question # 74

Question # 74

Options:

Question 75

Question # 75

Question # 75

Options:

Question 76

Question # 76

Question # 76

Options:

Question 77

Question # 77

Question # 77

Options:

Question 78

Question # 78

Question # 78

Options:

Question 79

Question # 79

Question # 79

Options:

Question 80

Question # 80

Options:

Question 81

Question # 81

Question # 81

Options:

Question 82

Question # 82

Question # 82

Options:

Question 83

Question # 83

Question # 83

Options:

Question 84

Question # 84

Question # 84

Options:

Question 85

Question # 85

Question # 85

Options:

Question 86

Question # 86

Question # 86

Options:

Page: 1 / 38
Total 380 questions