Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers
Which language defines the structure or modelling of data for NETCONF and RESTCONF?
In a high-density AP environment, which feature can be used to reduce the RF cell size and not demodulate radio packets above a given threshold?
Drag and drop the configuration management tools from the left onto the configuration styles they use on the right
Refer to lhe exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF-capable CiscoIOSXE device that Is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF?
What is the purpose of a data modeling language?
What are two device roles in Cisco SD-Access fabric? (Choose two.)
What is a benefit of YANG modules?
What is a characteristic of a virtual machine?
What are two methods of ensuring that the multicast RPF check passes without changing the unicast routing table? (Choose two.)
Which feature is offered by the Cisco Advanced Malware Protection for Endpoints solution?
What is one characteristic of Cisco Catalyst Center (formerly DNA Center) and vManage northbound APIs?
Refer to the exhibit. Which python code snippet prints the descriptions of disabled interface only?
Drag and drop the code snippets from the bottom onto the blanks in the Python script to convert a Python object into a JSON string. Not all options are used.
In a campus network design, what are two benefits of using BFD for failure detection'? (Choose two.)
When deploying a Cisco Unified Wireless solution what is a design justification for using a distributed WLC deployment model?
Drag and drop the characteristics of Cisco Catalyst SD-WAN from the left onto the right. Not all options are used.
Which language can be used to model configuration and state data?
Which NGFW mode block flows crossing the firewall?
Which type of tunnel is required between two WLCs to enable intercontroller roaming?
Which next generation firewall feature supports separate security services for multiple departments?
What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?
Which function is performed by vSmart in the Cisco Catalyst SD-WAN architecture?
What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?
Which three methods does Cisco Catalyst Center (formerly DNA Center) use to discover devices? (Choose three.)
What is used by vManage to interact withCiscoSD-WAN devices in the fabric?
An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?
event manager applet LogMessage
event routing network 172.30.197.0/24 type all
What is a characteristic of VXLAN?
An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?
In a Cisco SD-Access network architecture, which access layer cabling design is optimal for the underlay network?
Drag and drop the automation characteristics from the left to the corresponding tools on the right.
Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request that configures a deny rule on an access list?
Drag and drop the code snippets from the bottom onto blanks m the Python script so that the program changes the IP address and saves It as a new JSON Me on the disk Not all options are used
An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionally?
Which method ensures the confidentiality of data exchanged over a REST API?
Refer to the exhibit. The existing configuration must be updated to terminate all EXEC sessions after 120 minutes. Which command set should be applied?
Refer to the exhibit A network engineer must use a Python script lo convert data received from a network device. Which type of data is printed to the console when the script runs?
What is one method for achieving REST API security?
What is a characteristic of Layer 3 roaming?
Which deployment option of Cisco NGFW provides scalability?
An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement?
What is the VXLAN network identifier used to identify?
What is the JSON syntax that is formed the data?
A)
B)
C)
D)
What are two characteristics of a directional antenna? (Choose two.)
Which security feature does stateless authentication and authorization use for REST API calls?
Which AP mode allows an engineer to scan configured channels for rogue access points?
Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity?
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?
Which method requires a client to authenticate and has the capability to function without encryption?
Refer to the exhibit. Which result does the python code achieve?
Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?
A)
B)
C)
D)
Ascriptcontainsthe statement white loop != 999 ’ Which value terminates the loop?
What is the role of a LISP map server?
Which multicast operational mode sends a prune message to the source when there are no connected members or downstream neighbors?
Refer to the exhibit.
Which JSON syntax is derived from this data?
OR