Weekend Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Cisco 350-401 Dumps

Page: 1 / 38
Total 380 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

as

as

Options:

Question 2

as

as

Options:

Question 3

as

as

Options:

Question 4

as

as

Options:

Question 5

as

Options:

Question 6

as

as

Options:

Question 7

as

as

Options:

Question 8

as

as

as

Options:

Question 9

as

as

Options:

Question 10

as

as

Options:

Question 11

as

as

Options:

Question 12

as

OR

as

as

Options:

Question 13

as

as

Options:

Question 14

as

as

Options:

Question 15

as

as

Options:

Question 16

as

as

as

Options:

Question 17

as

as

Options:

Question 18

as

as

Options:

Question 19

as

as

Options:

Question 20

as

as

Options:

Question 21

as

as

Options:

Question 22

as

as

Options:

Question 23

as

as

Options:

Question 24

as

as

Options:

Question 25

as

as

Options:

Question 26

as

as

Options:

Question 27

as

as

Options:

Question 28

as

as

Options:

Question 29

as

as

as

as

Options:

Question 30

Which data is properly formatted with JSON?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 31

An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?

Options:

A.

event manager applet ENABLE_OSPF_DEBUGevent syslog pattern "%OSPF-1-ADJCHG: Process 5. Nbr 1.1.1.1 on SerialO/0 from FULL to DOWN"action 1.0 cli command "debug ip ospf event"action 2.0 cli command "debug ip ospf adj"action 3.0 syslog priority informational msg "ENABLE_OSPF_DEBUG

B.

event manager applet ENABLEOSPFDEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 5, Nbr 1.1.1.1 on SerialO/0 from LOADING to FULL"action 1.0 cli command "debug ip ospf event"action 2.0 cli command "debug ip ospf adj"action 3.0 syslog priority informational msg "ENABLE JDSPF_DEBUG"

C.

event manager apple! ENABLE OSPFDEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 5. Nbr 1.1.1.1 on SerialO/0 from LOADING to FULL"action 1.0 cli command "enable"action 2.0 cli command "debug ip ospf event"action 3.0 cli command "debug ip ospf adj"action 4.0 syslog priority informational msg "ENABLE_OSPFJ} EBUG"

D.

event manager applet ENABLE_OSPF_DEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 6. Nbr 1.1.1.1 on SerialO/0 from FULL to DOWN"action 1.0 cli command "enable"action 2.0 cli command "debug ip ospf event"action 3.0 cli command "debug ip ospf adj"action 4.0 syslog priority informational msg "ENABLE_OSPF_DEBUG'*

Question 32

Which two operations are valid for RESTCONF? (Choose two)

Options:

A.

PULL

B.

ADD

C.

HEAD

D.

REMOVE

E.

GET

F.

PUSH

Question 33

Which function does a Cisco SD-Access extended node perform?

Options:

A.

in charge of establishing Layer 3 adjacencies with nonfabric unmanaged node

B.

performs tunnelling between fabric and nonfabric devices to route traffic over unknown networks

C.

provides fabric extension to nonfabric devices through remote registration and configuration

D.

used to extend the fabric connecting to downstream nonfabric enabled Layer 2 switches

Question 34

In a Cisco SD-Access network architecture, which access layer cabling design is optimal for the underlay network?

Options:

A.

Switches are cross-finned at the same layer and have a single connection to each upstream distribution device

B.

Switches are connected to each upstream distribution and core device.

C.

Switches are connected to each upstream distribution device.

D.

Switches are cross-linked to devices at the same layer and at the upstream and downstream devices.

Question 35

What is the API keys option for REST API authentication?

Options:

A.

a credential that is transmitted unencrypted

B.

one-time encrypted token

C.

a username that is stored in the local router

D.

a predetermined string that is passed from client to server.

Question 36

What is the intent API in Cisco Catalyst Center (formerly DNA Center)?

Options:

A.

northbound consumer-facing RESTful API, which enables network discovery and configuration management

B.

southbound consumer-facing RESTful API. which enables network discovery and configuration management

C.

interface between the controller and the network devices, which enables network discovery and configuration management

D.

westbound interface, which allows the exchange of data such as ITSM. IPAM, and reporting information

Question 37

Which definition describes JWT in regard to REST API security?

Options:

A.

an encrypted JSON token that is used for authentication

B.

an encrypted JSON token that is used for authorization

C.

an encoded JSON token that is used to securely exchange information

D.

an encoded JSON token that is used for authentication

Question 38

What is YANG used for?

Options:

A.

scraping data via CLI

B.

processing SNMP read-only polls

C.

describing data models

D.

prowling a transport for network configuration data between client and server

Question 39

What is an advantage of utilizing data models in a multivendor environment?

Options:

A.

facilitating a unified approach to configuration and management

B.

improving communication security with binary-encoded protocols

C.

lowering CPU load incurred to managed devices

D.

removing the distinction between configuration and runtime state data

Question 40

What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?

Options:

A.

SSH

B.

TLS

C.

HTTPS

D.

JWT

Question 41

What is a characteristic of a traditional WAN?

Options:

A.

low complexity and high overall solution scale

B.

centralized reachability. security, and application policies

C.

operates over DTLS and TLS authenticated and secured tunnels

D.

unified data plane and control plane

Question 42

A company recently decided to use RESTCONF instead of NETCONF. and many of their NETCONF scripts contain the operation (operation-create). Which RESTCONF operation must be used to replace these statements?

Options:

A.

CREATE

B.

POST

C.

GET

D.

PUT

Question 43

Which method does FastLocate use to collect location-based information?

Options:

A.

RFID

B.

client probing

C.

beacons

D.

data packets

Question 44

as

Reler to the exhibit. An engineer configuring WebAuth on a Cisco Catalyst 9000 Series WIC. The engineer has purchased a third-party certificate using the FQDN of the WLC as the CN and intends to use bit on the WebAuth splash page What must be configured so that the clients do not receive a certificate error?

Options:

A.

Virtual IPv4 Address must be set to a routable address.

B.

Virtual IPv4 Hostname must match the CN of the certificate.

C.

Trustpoint must be set to the management certificate of the WLC.

D.

Web Auth Intercept HTTPs must be enabled.

Question 45

Which type of roaming event occurs when a client roams across multiple mobility groups?

Options:

A.

Layer 3

B.

Layer 7

C.

Layer 1

D.

Layer 2

Question 46

as

Refer to the exhibit. What is the value of the variable list after the code is run?

Options:

A.

[1,2.1.2.1,2]

B.

[1,2] * 3

C.

[3,6]

D.

[1,2]. [1.2]. [1,2]

Question 47

Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two.)

Options:

A.

modular QoS

B.

policy routing

C.

web authentication

D.

DHCP

E.

IEEE 802.1x

Question 48

In a campus network design, what are two benefits of using BFD for failure detection'? (Choose two.)

Options:

A.

BFD speeds up routing convergence time

B.

BFD provides path failure detection in less than a second

C.

BFD provides fault tolerance by enabling multiple routers to appear as a single virtual router

D.

BFD is an efficient way to reduce memory and CPU usage

E.

BFD enables network peers to continue forwarding packets in the event of a restart

Question 49

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?

Options:

A.

EIRP

B.

mW

C.

dBm

D.

dBi

Question 50

Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.

as

Options:

Question 51

Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two.)

Options:

A.

custom headers

B.

authentication

C.

authorization

D.

request management

E.

accounting

Question 52

An engineer is reviewing a PCAP file that contains a packet capture of a four-way handshake exchange between a dient and AP using WPA2 Enterprise Which EAPOL message validates and confirms that the client device has successfully Installed the GTK?

Options:

A.

M4-Message

B.

M3-Message

C.

M2-Message

D.

M1-Message

Question 53

as

What is the JSON syntax that is formed from the data?

Options:

A.

Make”:‘Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}

B.

'Make ”: “Gocar1, “Model”: “Zoom”, “Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]

C.

{“Make”: Gocar, “Model": Zoom, “Features": Power Windows, Manual Drive, Auto AC}

D.

(“Make”:[ “Gocar”, “Model": “Zoom"], Features”: [“Power Windows", “Manual Drive", “Auto AC”]}

Question 54

In a Cisco SD-Access wireless architecture, which device manages endpoint ID to edge node bindings?

Options:

A.

fabric control plane node

B.

fabric edge node

C.

fabric border node

D.

fabric wireless controller

Question 55

Which network design principle should be followed to improve Layer 2 stability in an enterprise campus design?

Options:

A.

Extend all user VLANs throughout the access layer

B.

Extend only required user VLANs throughout the access layer

C.

Extend all user VLANs throughout the core layer

D.

Extend only required user VLANs throughout the aggregation layer

Question 56

Refer to the exhibit.

as

Which action must be taken to configure a WLAN for WPA2-AES with PSK and allow only 802.11r-capable clients to connect?

Options:

A.

Enable PSK and FT + PSK.

B.

Enable Fast Transition and FT + PSK.

C.

Enable Fast Transition and PSK.

D.

Change Fast Transition to Adaptive Enabled and enable FT * PSK.

Question 57

Which language can be used to model configuration and state data?

Options:

A.

JSON

B.

XML

C.

XDR

D.

YANG

Page: 1 / 38
Total 380 questions