Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Cisco 350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Exam Practice Test

Demo: 68 questions
Total 258 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Which lag/profile on a Cisco Catalyst 9800 Series WLC must be modified to allow Cisco ISE to dynamically assign VLANs to users on an 802.1X-based SSID?

Options:

A.

interface lag

B.

site tag

C.

WLAN profile

D.

policy profile

Question 2

Refer to the exhibit. What is the value of the variable list after the code is run?

Options:

A.

[1,2.1.2.1,2]

B.

[1,2] * 3

C.

[3,6]

D.

[1,2]. [1.2]. [1,2]

Question 3

Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used.

Options:

Question 4

Why would a network engineer configure an AP in SE-Connect mode?

Options:

A.

to redirect WLAN traffic to an endpoint for protocol analysis

B.

to monitor the VLAN traffic for rogue APs

C.

to connect the wired LAN with the wireless infrastructure

D.

to analyze the RF spectrum surrounding the AP

Question 5

Refer to the exibit. How should the programmer access the list of VLANs that are recevied via the API call?

Options:

A.

VlanNames(0)

B.

VlanName[Vlan1']

C.

VlanName['response']

D.

list(VlanNames)

Question 6

What is used to measure the total output energy of a Wi-Fi device?

Options:

A.

dBi

B.

EIRP

C.

mW

D.

dBm

Question 7

Which access control feature does MAB provide?

Options:

A.

user access based on IP address

B slows devices to bypass authentication

B.

network access based on the physical address of a device

C.

simultaneous user and device authentication

Question 8

Which AP mode allows an engineer to scan configured channels for rogue access points?

Options:

A.

sniffer

B.

monitor

C.

bridge

D.

local

Question 9

Which features does Cisco EDR use to provide threat detection and response protection?

Options:

A.

containment, threat intelligence, and machine learning

B.

firewalling and intrusion prevention

C.

container-based agents

D.

cloud analysts and endpoint firewall controls

Question 10

Which two actions are recommended as security best practices to protect REST API? (Choose two.)

Options:

A.

Use SSL for encryption.

B.

Enable out-of-band authentication.

C.

Enable dual authentication of the session.

D.

Use TACACS+ authentication.

E.

Use a password hash.

Question 11

In a campus network design, what are two benefits of using BFD for failure detection'? (Choose two.)

Options:

A.

BFD speeds up routing convergence time

B.

BFD provides path failure detection in less than a second

C.

BFD provides fault tolerance by enabling multiple routers to appear as a single virtual router

D.

BFD is an efficient way to reduce memory and CPU usage

E.

BFD enables network peers to continue forwarding packets in the event of a restart

Question 12

Where is radio resource management performed in a Cisco SD-Access wireless solution?

Options:

A.

DNA Center

B.

wireless controller

C.

Cisco CMX

D.

control plane node

Question 13

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?

Options:

A.

EIRP

B.

mW

C.

dBm

D.

dBi

Question 14

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

Options:

A.

A close up of a text AI-generated content may be incorrect.

B.

A close up of a logo AI-generated content may be incorrect.

C.

A close up of a text AI-generated content may be incorrect.

D.

A black text on a white background AI-generated content may be incorrect.

Question 15

What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?

Options:

A.

It facilitates software upgrades to network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It uses a predefined configuration through parameterized elements or variables.

D.

It provides a high-level overview of the health of every network device.

Question 16

Which language defines the structure or modelling of data for NETCONF and RESTCONF?

Options:

A.

JSON

B.

YANG

C.

XML

D.

YAML

Question 17

A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described?

Options:

A.

intra-VLAN

B.

inter-controller

C.

intra-controller

D.

inter-subnet

Question 18

What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?

Options:

A.

real-time threat management to stop DDoS attacks to the core and access networks

B.

malware control

C.

real-time awareness of users, devices, and traffic on the network

D.

dynamic threat control for web traffic 

Question 19

An engineer must protect their company against ransom ware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?

Options:

A.

Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation.

B.

Use Cisco AMP deployment with the Malicious Activity Protection engine enabled.

C.

Use Cisco AMP deployment with the Exploit Prevention engine enabled.

D.

Use Cisco Firepower and block traffic to TOR networks.

Question 20

What is required for a VXLAN tunnel endpoint to operate?

Options:

A.

a VXLAN tunnel endpoint identifier

B.

at least one Layer 2 interface and one Layer 3 interlace

C.

at least one IP for the transit network and one IP for endpoint connectivity

D.

a VXLAN network identifier

Question 21

Drag and drop the configuration management tools from the left onto the configuration styles they use on the right

Options:

Question 22

Refer to the exhibit. Which configuration causes the traffic from PC-1 to the internet to use the link between CoreSW-1 and CoreSW-2 when both switches are up?

Options:

A.

B.

C.

D.

Question 23

Which technology collects location information through data packets received by the APs instead of using mobile device probes?

Options:

A.

detect and locate

B.

FastLocate

C.

hyperlocation

D.

RF fingerprinting

Question 24

Which action controls the maximum cell size in a high-density wireless environment?

Options:

A.

Statically set TX power on access points to max.

B.

Disable low data rates.

C.

Set mandatory data rates.

D.

Decrease TX power on access points.

Question 25

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

Options:

A.

RSSI

B.

SNR

C.

Noise

D.

CCI

Question 26

Which Cisco Catalyst SD-WAN component is responsible for distributing data plane traffic policies?

Options:

A.

vBond

B.

vManage

C.

vSmart

D.

WAN edge

Question 27

Which tool functions in a push model, supports languages like Python or Ruby, and does not require an agent to be installed per host?

Options:

A.

Puppet

B.

Ansible

C.

Saltstack

D.

Chef

Question 28

Refer to the exhibit. A POST /discovery request spawns an asynchronous task. After querying for more information about the task, the Cisco DNA Center platform returns the REST API response. What is the status of the discovery task?

Options:

A.

restarted

B.

failed

C.

stopped

D.

successful

Question 29

Refer to the exhibit. Which HTTP request produced the REST API response that was returned by the Cisco Catalyst Center (formerly DNA Center) platform?

Options:

A.

POST /auth/token

B.

GET /network-device

C.

GET /template-programmer/template/version/42a3df73-3ef4-49e2-b4f0-6927bbd4bf52

D.

POST /discovery

Question 30

Which feature is available to clients using layer 2 roaming in a wireless infrastructure?

Options:

A.

Room to a different wireless controller that is on o different subnet and maintain the same IP address

B.

Associate to a new access point on a different wireless controller and change the IP address without connectivity interruption

C.

Associate to a new access point on the same wireless controller and change the IP address without connectivity interruption

D.

Roam to a different wireless controller that snares The same subnet and maintain the same IP address

Question 31

An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?

Options:

A.

EAP-TLS

B.

EAP-FAST

C.

LDAP

D.

PEAP

Question 32

Which two sources cause interference for Wi-Fi networks? (Choose two.)

Options:

A.

incandescent lights

B.

DECT 6.0 cordless phone

C.

mirrored wall

D.

fish tank

E.

900MHz baby monitor

Question 33

Which method requires a client to authenticate and has the capability to function without encryption?

Options:

A.

open

B.

WEP

C.

WebAuth

D.

PSK

Question 34

Which action reduces sticky clients in dense RF environments?

Options:

A.

Decrease radio channel widths to 40 MHz.

B.

Increase the mandatory minimum data rates.

C.

Decrease the mandatory minimum data rates.

D.

Increase radio channel widths to 160 MHz.

Question 35

In Cisco CatalystCenter(formerly DNA Center) Inventory, the Software Version of a networkdevice displays a status of OUTDATED. What does It me?

Options:

A.

There is a later software version available on Cisco Catalyst Center (formerly DNA Center).

B.

The current software image does not match the selected Golden image for this type of network device.

C.

The current type of software image does not match the type of the network device.

D.

There is a later software version available at www.cisco.com website.

Question 36

What is a client who is using 802.1x for authentication referred to as?

Options:

A.

authenticator

B.

policy enforcement point

C.

NAC device

D.

supplicant

Question 37

Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?

Options:

A.

ingress tunnel router

B.

map resolver

C.

egress tunnel router

D.

map server

Question 38

How is Layer 3 roaming accomplished in a unified wireless deployment?

Options:

A.

An EoIP tunnel is created between the client and the anchor controller to provide seamless connectively as the client is associated with the new AP.

B.

The client entry on the original controller is passed to the database on the new controller.

C.

The new controller assign an IP address from the new subnet to the client.

D.

The client database on the original controller is updated with the anchor entry, and the new controller database is updated with the foreign entry.

Question 39

To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?

Options:

A.

security ft adaptive

B.

security wpa akm dotlx

C.

security wpa akm psk

D.

security wpa akm ft psk

Question 40

Options:

Question 41

Options:

Question 42

Options:

Question 43

Options:

Question 44

OR

Options:

Question 45

Options:

Question 46

Options:

Question 47

Options:

Question 48

Options:

Question 49

Options:

Question 50

Options:

Question 51

Options:

Question 52

Options:

Question 53

Options:

Question 54

Options:

Question 55

Options:

Question 56

Options:

Question 57

Options:

Question 58

Options:

Question 59

Options:

Question 60

Options:

Question 61

Options:

Question 62

Options:

Question 63

Options:

Question 64

Options:

Question 65

Options:

Question 66

Options:

Question 67

Options:

Question 68

Options:

Demo: 68 questions
Total 258 questions