Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Cisco 350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Exam Practice Test

Page: 1 / 34
Total 335 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$49  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$42  $119.99
Question 1

Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.

Options:

Question 2

What is a characteristic of omnidirectional antennas?

Options:

A.

It includes dish antennas.

B.

It has high gain.

C.

It provides the most focused and narrow beamwidth.

D.

It includes dipole antennas.

Question 3

Which two operations are valid for RESTCONF? (Choose two)

Options:

A.

PULL

B.

ADD

C.

HEAD

D.

REMOVE

E.

GET

F.

PUSH

Question 4

Which method displays text directly into the active console with a synchronous EEM applet policy?

Options:

A.

event manager applet boom

event syslog pattern 'UP'

action 1.0 gets 'logging directly to console'

B.

event manager applet boom

event syslog pattern 'UP'

action 1.0 syslog priority direct msg 'log directly to console'

C.

event manager applet boom

event syslog pattern 'UP'

action 1.0 puts 'logging directly to console'

D.

event manager applet boom

event syslog pattern 'UP'

action 1.0 string 'logging directly to console'

Question 5

What is a client who is using 802.1x for authentication referred to as?

Options:

A.

authenticator

B.

policy enforcement point

C.

NAC device

D.

supplicant

Question 6

What does a next-generation firewall that is deployed at the data center protect against?

Options:

A.

signature-based malware

B.

DMZ web server vulnerabilities

C.

zero-day attacks

D.

DDoS

Question 7

What are two benefits of using Cisco TrustSec? (Choose two.)

Options:

A.

unknown file analysis using sandboxing

B.

advanced endpoint protection against malware

C.

end-to-end traffic encryption

D.

simplified management of network access

E.

consistent network segmentation

Question 8

Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used.

Options:

Question 9

An engineer is installing a new pair of routers in a redundant configuration. Which protocol ensures that traffic is not disrupted in the event of a hardware failure?

Options:

A.

HSRPv1

B.

GLBP

C.

VRRP

D.

HSRPv2

Question 10

What does the statement print(format(0.8, \0%')) display?

Options:

A.

80%

B.

8.8%

C.

.08%

D.

8%

Question 11

What are two device roles in the Cisco SD-Access fabric? (Choose two.)

Options:

A.

access switch

B.

vBond controller

C.

edge node

D.

core switch

E.

border node

Question 12

Which component transports data plane traffic across a Cisco SD-WAN network?

Options:

A.

vSmart

B.

vManage

C.

cEdge

D.

vBond

Question 13

Which action is a LISP Map Resolver responsible for?

Options:

A.

forwarding user data traffic

B.

accepting map-request messages from ITRs

C.

finding EID-to-RLOC mappings

D.

accepting registration requests from ETRs

Question 14

Drag and drop the characteristics from the left into the orchestration tools that they describe on the right.

Options:

Question 15

Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used.

Options:

Question 16

Which controller is the single plane of management for Cisco SD-WAN?

Options:

A.

vBond

B.

vEdge

C.

vSmart

D.

vManage

Question 17

Which two sources cause interference for Wi-Fi networks? (Choose two.)

Options:

A.

incandescent lights

B.

DECT 6.0 cordless phone

C.

mirrored wall

D.

fish tank

E.

900MHz baby monitor

Question 18

Where is radio resource management performed in a Cisco SD-Access wireless solution?

Options:

A.

DNA Center

B.

wireless controller

C.

Cisco CMX

D.

control plane node

Question 19

Refer to the exhibit.

What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

Options:

A.

A NETCONF request was made for a data model that does not exist.

B.

The device received a valid NETCONF request and serviced it without error.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

D.

The NETCONF running datastore is currently locked.

Question 20

What are two of benefits of using VXLAN? (Choose two.)

Options:

A.

It allows for an unlimited number of segments.

B.

It has fewer devices to manage.

C.

It uses all available Layer 3 paths in the underlying network.

D.

It allows multi-tenanted segmentation.

E.

It uses a MAC in IP/TCP encapsulation technique.

Question 21

What is a TLOC in a Cisco SD-WAN deployment?

Options:

A.

value that identifies a specific tunnel within the Cisco SD-WAN overlay

B.

identifier that represents a specific service offered by nodes within the Cisco SD-WAN overlay

C.

attribute that acts as a next hop for network prefixes

D.

component set by the administrator to differentiate similar nodes that offer a common service

Question 22

Which task Is mandatory when provisioning a device through the plug-and-play workflow in Cisco DNA Center?

Options:

A.

site assignment

B.

slack serial number assignment

C.

golden image upgrade

D.

template configuration application

Question 23

Refer to the exhibit. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?

Options:

A.

event manager applet EEM_IP_SLAevent track 10 state down

B.

event manager applet EEM_IP_SLAevent sla 10 state unreachable

C.

event manager applet EEM_IP_SLAevent sla 10 state down

D.

event manager applet EEM_IP_SLAevent track 10 state unreachable

Question 24

Refer to the exhibit. What is determined from the output?

Options:

A.

10.0.0.100 is managed by Cisco Catalyst Center (formerly DNA Center).

B.

The URL for the second query is syntactically incorrect.

C.

The authentication for the second query fails.

D.

10.0.0.200 is known to DNA Center, but its ID is an empty string.

Question 25

What is a characteristics of a type 1 hypervisor?

Options:

A.

It runs on top of the host operating system.

B.

It is preferred for supporting nonproduction workloads.

C.

It has greater latency than a Type 2 hypervisor.

D.

It runs on top of bare metal servers.

Question 26

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

Options:

A.

Cisco Firepower and FireSIGHT

B.

Cisco Stealth watch system

C.

Advanced Malware Protection

D.

Cisco Web Security Appliance

Question 27

Refer to the exhibit. An engineer must adjust the configuration so that Router A becomes the active router. Which commands should be applied to router A? (Choose two)

Options:

A.

vrrp 1 priority 90

B.

vrrp 1 timers advertise 1

C.

vrrp lip 10.1.0.11

D.

ip address 10.1.0.11 255.0.0.0

E.

vrrp 1 priority 120

Question 28

Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)

Options:

A.

integrated intrusion prevention

B.

VPN

C.

application-level inspection

D.

stateful packet inspection

E.

NAT

Question 29

Which NGFW mode block flows crossing the firewall?

Options:

A.

Passive

B.

Tap

C.

Inline tap

D.

Inline

Question 30

What is one characteristic of an AP that is operating in Mobility Express mode?

Options:

A.

It is recommended for large scale deployments.

B.

It requires a centralized WLC.

C.

At least three APs are needed for WLC redundancy.

D.

It requires an AP to act as a WLC.

Question 31

At which plane does vBond operate in Cisco SD-WAN solutions?

Options:

A.

control plane

B.

data plane

C.

orchestration plane

D.

management plane

Question 32

Which network design principle should be followed to improve Layer 2 stability in an enterprise campus design?

Options:

A.

Extend all user VLANs throughout the access layer

B.

Extend only required user VLANs throughout the access layer

C.

Extend all user VLANs throughout the core layer

D.

Extend only required user VLANs throughout the aggregation layer

Question 33

Drag and drop the characteristics from the left onto the corresponding orchestration tool on the right.

Options:

Question 34

Refer to the exhibit.

A client requests a new SSID that will use web-based authentication and external RADIUS servers. Which Layer 2 security mode must be selected?

Options:

A.

Static WEP

B.

WPA2 + WPA3

C.

None

D.

WPA + WPA2

Question 35

In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)

Options:

A.

advertisement of network prefixes and their attributes

B.

configuration of control and data policies

C.

gathering of underlay infrastructure data

D.

delivery of crypto keys

E.

segmentation and differentiation of traffic

Question 36

Which JSON syntax is valid?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 37

Which data format can be used for an API request?

Options:

A.

HTML

B.

PERL

C.

JSON

D.

Python

Question 38

What is used by vManage to interact with Cisco SD-WAN devices in the fabric?

Options:

A.

northbound API

B.

RESTCONF

C.

sounthbound API

D.

IPsec

Question 39

Drag and drop the code snippets from the bottom onto the blanks in the Python script to print the device model to the screen and write JSON data to a file. Not all options are used

Options:

Question 40

What is one characteristic of Cisco Catalyst Center (formerly DNA Center) and vManage northbound APIs?

Options:

A.

They implement the NETCONF protocol.

B.

They push configuration changes down to devices.

C.

They exchange XML-formatted content.

D.

They implement the RESTCONF protocol.

Question 41

Which character formatting is required for DHCP Option 43 to function with current AP models?

Options:

A.

ASCII

B.

Hex

C.

Base64

D.

MD5

Question 42

How does SSO work with HSRP to minimize network disruptions?

Options:

A.

It enables HSRP to elect another switch in the group as the active HSRP switch.

B.

It ensures fast failover in the case of link failure.

C.

It enables data forwarding along known routes following a switchover, white the routing protocol reconverges.

D.

It enables HSRP to failover to the standby RP on the same device.

Question 43

Which First Hop Redundancy Protocol should be used to meet a design requirements for more efficient default bandwidth usage across multiple devices?

Options:

A.

GLBP

B.

LCAP

C.

HSRP

D.

VRRP

Question 44

What is one characteristic of Cisco SD-Access networks?

Options:

A.

Devices are assigned to virtual networks based on their VLAN membership.

B.

Scalable group tags are used for macrosegmentatlon.

C.

Virtual networks are used for microsegmentation.

D.

All traffic is Layer 3 within the fabric.

Question 45

Which tool functions in a push model, supports languages like Python or Ruby, and does not require an agent to be installed per host?

Options:

A.

Puppet

B.

Ansible

C.

Saltstack

D.

Chef

Question 46

What is the JSON syntax that is formed from the data?

Options:

A.

Make”:‘Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}

B.

'Make ”: “Gocar1, “Model”: “Zoom”, “Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]

C.

{“Make”: Gocar, “Model": Zoom, “Features": Power Windows, Manual Drive, Auto AC}

D.

(“Make”:[ “Gocar”, “Model": “Zoom"], Features”: [“Power Windows", “Manual Drive", “Auto AC”]}

Question 47

Refer to the exhibit. A POST /discovery request spawns an asynchronous task. After querying for more information about the task, the Cisco DNA Center platform returns the REST API response. What is the status of the discovery task?

Options:

A.

restarted

B.

failed

C.

stopped

D.

successful

Question 48

Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.

Options:

Question 49

Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.

Options:

Question 50

In a campus network design, what are two benefits of using BFD for failure detection'? (Choose two.)

Options:

A.

BFD speeds up routing convergence time

B.

BFD provides path failure detection in less than a second

C.

BFD provides fault tolerance by enabling multiple routers to appear as a single virtual router

D.

BFD is an efficient way to reduce memory and CPU usage

E.

BFD enables network peers to continue forwarding packets in the event of a restart

Question 51

Options:

Question 52

Options:

Question 53

Options:

Question 54

Options:

Question 55

Options:

Question 56

Options:

Question 57

Options:

Question 58

Options:

Question 59

Options:

Question 60

Options:

Question 61

OR

Options:

Question 62

Options:

Question 63

Options:

Question 64

Options:

Question 65

Options:

Question 66

Options:

Question 67

Options:

Question 68

Options:

Question 69

Options:

Question 70

Options:

Question 71

Options:

Question 72

Options:

Question 73

Options:

Question 74

Options:

Question 75

Options:

Question 76

Options:

Question 77

Options:

Question 78

Options:

Question 79

Options:

Page: 1 / 34
Total 335 questions