Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Cisco 350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Exam Practice Test

Page: 1 / 38
Total 380 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36  $119.99
Question 1

Options:

Question 2

Options:

Question 3

Options:

Question 4

Options:

Question 5

Options:

Question 6

Options:

Question 7

Options:

Question 8

Options:

Question 9

Options:

Question 10

Options:

Question 11

Options:

Question 12

OR

Options:

Question 13

Options:

Question 14

Options:

Question 15

Options:

Question 16

Options:

Question 17

Options:

Question 18

Options:

Question 19

Options:

Question 20

Options:

Question 21

Options:

Question 22

Options:

Question 23

Options:

Question 24

Options:

Question 25

Options:

Question 26

Options:

Question 27

Options:

Question 28

Options:

Question 29

Options:

Question 30

Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)

Options:

A.

integrated intrusion prevention

B.

VPN

C.

application-level inspection

D.

stateful packet inspection

E.

NAT

Question 31

Which NGFW mode block flows crossing the firewall?

Options:

A.

Passive

B.

Tap

C.

Inline tap

D.

Inline

Question 32

What is the JSON syntax that is formed the data?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 33

Refer to the exhibit An engineer is troubleshooting an issue with non-Wi-Fi interference on the 5-GHz band The engineer has enabled Cisco CleanAir and set the appropriate traps, but the AP does not change the channel when it detects significant interference Which action will resolve the issue?

Options:

A.

Enable the Avoid Persistent Non-WiFi Interference option

B.

Disable the Avoid Foreign AP Interference option.

C.

Change the DCA Sensitivity option to High

D.

Enable the Event Driven Radio Resource Management option

Question 34

Which location tracking method is used when locating client devices using Cisco hyperlocation?

Options:

A.

angle of arrival

B.

location patterning

C.

TTL

D.

line of sight

Question 35

Which data format can be used for an API request?

Options:

A.

HTML

B.

PERL

C.

JSON

D.

Python

Question 36

In a fabric-enabled wireless network, which device is responsible for maintaining the endpoint ID database?

Options:

A.

fabric border node

B.

fabric edge node

C.

fabric wireless controller

D.

control plane node

Question 37

Which component transports data plane traffic across a Cisco SD-WAN network?

Options:

A.

vSmart

B.

vManage

C.

cEdge

D.

vBond

Question 38

Which technology reduces the implementation of STP and leverages both unicast and multicast?

Options:

A.

VLAN

B.

VXLAN

C.

VPC

D.

VSS

Question 39

What is a characteristic of VRRP?

Options:

A.

It inherently balances load amongst the available gateways.

B.

It ensures symmetric traffic flow upstream and downstream.

C.

It Is a Cisco proprietary protocol.

D.

It uses a virtual IP address and a virtual MAC address to achieve redundancy

Question 40

Why would an architect use an OSPF virtual link?

Options:

A.

to allow a stub area to transit another stub area

B.

to merge two existing Area 0s through a nonbackbone

C.

to connect two networks that have overlapping private IP address space

D.

to connect a nonbackbone area to Area 0 through another nonbackbone area

Question 41

What is used by vManage to interact with Cisco SD-WAN devices in the fabric?

Options:

A.

northbound API

B.

RESTCONF

C.

sounthbound API

D.

IPsec

Question 42

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 43

What is a fact about Cisco EAP-FAST?

Options:

A.

It requires a client certificate.

B.

It operates in transparent mode.

C.

It Is an IETF standard.

D.

It does not require a RADIUS server certificate.

Question 44

Which language can be used to model configuration and state data?

Options:

A.

JSON

B.

XML

C.

XDR

D.

YANG

Question 45

What is required for a VXLAN tunnel endpoint to operate?

Options:

A.

a VXLAN tunnel endpoint identifier

B.

at least one Layer 2 interface and one Layer 3 interlace

C.

at least one IP for the transit network and one IP for endpoint connectivity

D.

a VXLAN network identifier

Question 46

An engineer must protect their company against ransom ware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?

Options:

A.

Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation.

B.

Use Cisco AMP deployment with the Malicious Activity Protection engine enabled.

C.

Use Cisco AMP deployment with the Exploit Prevention engine enabled.

D.

Use Cisco Firepower and block traffic to TOR networks.

Question 47

How do FHRPs differ from SSO?

Options:

A.

FHRPs provide gateway redundancy, and SSO provides failover within a single device

B.

FHRPs maintain state information within a single device, and SSO manages state information across multiple devices.

C.

FHRPs use OTV for redundancy, and SSO uses VXLAN for state synchronization.

D.

FHRPs influence bandwidth allocation, and SSO influences routing decisions.

Question 48

What are two methods of ensuring that the multicast RPF check passes without changing the unicast routing table? (Choose two.)

Options:

A.

disabling the interface of the router back to the multicast source

B.

implementing MBGP

C.

disabling BGP routing protocol

D.

implementing static mroutes

E.

implementing OSPF routing protocol

Question 49

Which message type is valid for IGMPv3?

Options:

A.

leave group

B.

hello

C.

graft

D.

source-specific membership report

Question 50

Refer to the exhibit. Based on this JSON response:

Which Python statement parses the response and prints "10:42:36.111 UTC Mon Jan 1 2024"?

Options:

A.

printfresponset[jsonrpc'][‘body’]['simple_time'])

B.

print(response[result'][0][,simple_time,])

C.

printfresponsefresult'Jfbody'JfsimpleJime'])

D.

printfresponsel'body'jrsimplejime'])

Question 51

Which consideration must be made when using BFD in a network design?

Options:

A.

BFD requires a FHRP in order to provide sub second host failover.

B.

BFD can be deployed without any IP routing protocols being configured.

C.

NSF and graceful restart must be enabled on all participating routers.

D.

Cisco Express forwarding and IP routing must be enabled on all participating routers.

Question 52

What is a TLOC in a Cisco SD-WAN deployment?

Options:

A.

value that identifies a specific tunnel within the Cisco SD-WAN overlay

B.

identifier that represents a specific service offered by nodes within the Cisco SD-WAN overlay

C.

attribute that acts as a next hop for network prefixes

D.

component set by the administrator to differentiate similar nodes that offer a common service

Question 53

How does Cisco DNA Center perform a network discovery?

Options:

A.

using SNMP

B.

using ICMP

C.

through a DHCP server

D.

using CDP with a seed IP address

Question 54

Which feature provides data-plane security for Cisco Catalyst SD-WAN networks'?

Options:

A.

IPsec

B.

SSH

C.

IPS

D.

TLS/DTLS

Question 55

Which function is performed by vSmart in the Cisco Catalyst SD-WAN architecture?

Options:

A.

facilitation of NAT detection and traversal

B.

redistribution between OMP and other routing protocols

C.

distribution of IPsec keys

D.

execution of localized policies

Question 56

Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used.

Options:

Question 57

What is one role of an AP join profile on a Cisco wireless network?

Options:

A.

To allocate IP addresses to APs.

B.

To provide the settings and credentials that allow APs to authenticate to the network.

C.

To allocate network resources dynamically based on demand.

D.

To manage the radio frequency settings in different areas.

Page: 1 / 38
Total 380 questions