Month End Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Cisco 350-401 Dumps

Page: 1 / 34
Total 335 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

as

Refer to the exibit. How should the programmer access the list of VLANs that are recevied via the API call?

Options:

A.

VlanNames(0)

B.

VlanName[Vlan1']

C.

VlanName['response']

D.

list(VlanNames)

Question 2

Which three methods does Cisco DNA Centre use to discover devices? (Choose three)

Options:

A.

CDP

B.

SNMP

C.

LLDP

D.

ping

E.

NETCONF

F.

a specified range of IP addresses

Question 3

Whichtwo benefits result from a network design mat uses small and repeatable sections? (Choose two.)

Options:

A.

lower monitoring requirements

B.

low latency

C.

scalability

D.

quick failure isolation

E.

improved throughput

Question 4

What is one characteristic of Cisco DNA Center and vManage northbound APIs?

Options:

A.

They push configuration changes down to devices.

B.

They implement the RESTCONF protocol.

C.

They exchange XML-formatted content.

D.

They implement the NETCONF protocol.

Question 5

What is the base unit of definition in YANG?

Options:

A.

module

B.

include statement

C.

stanza

D.

node

Question 6

Which two conditions occur when the primary route processor fails on a switch thatisusing dual route processors with stateful switchover? (Choose two.)

Options:

A.

Data forwarding is stopped until the routing protocols reconverge after the switchover.

B.

The standby route processor initialization is started when the primary router processor fails.

C.

The standby route processor is fully initialed and state information is maintained.

D.

User sessions are immediately recreated on the new active route processor.

E.

Data forwarding can continue along known paths until routing protocol information is restored.

Question 7

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?

Options:

A.

Layer 3

B.

inter-xTR

C.

auto anchor

D.

fast roam

Question 8

What is the intent API in Cisco Catalyst Center (formerly DNA Center)?

Options:

A.

northbound consumer-facing RESTful API, which enables network discovery and configuration management

B.

southbound consumer-facing RESTful API. which enables network discovery and configuration management

C.

interface between the controller and the network devices, which enables network discovery and configuration management

D.

westbound interface, which allows the exchange of data such as ITSM. IPAM, and reporting information

Question 9

What is one characteristic of Cisco Catalyst Center (formerly DNA Center) and vManage northbound APIs?

Options:

A.

They implement the NETCONF protocol.

B.

They push configuration changes down to devices.

C.

They exchange XML-formatted content.

D.

They implement the RESTCONF protocol.

Question 10

Drag and drop the code snippets from the bottom onto blanks m the Python script so that the program changes the IP address and saves It as a new JSON Me on the disk Not all options are used

as

Options:

Question 11

When should the MAC authentication bypass feature be used on a switch port?

Options:

A.

when authentication is required, but the attached host does not support 802.1X

B.

when the attached host supports 802.1X and must authenticate itself based on its MAC address instead of user credentials

C.

when authentication should be bypassed for select hosts based on their MAC address

D.

when the attached host supports limited 802.1X

Question 12

A script contains the statement •white loop != 999 ’ Which value terminates the loop?

Options:

A.

A value equal to 999.

B.

A value not equal to 999.

C.

A value greater than or equal to 999.

D.

A value less than or equal to 999.

Question 13

as

Refer to the exhibit. Which result does the python code achieve?

Options:

A.

The code encrypts a base64 decrypted password.

B.

The code converts time to the "year/month/day" time format.

C.

The code converts time to the yyyymmdd representation.

D.

The code converts time to the Epoch LINUX time format.

Question 14

On which protocol or technology is the fabric data plane based in Cisco SD-Access fabric?

Options:

A.

LISP

B.

IS-IS

C.

Cisco TrustSec

D.

VXLAN

Question 15

as

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

Options:

A.

A close up of a text AI-generated content may be incorrect.

B.

A close up of a logo AI-generated content may be incorrect.

C.

A close up of a text AI-generated content may be incorrect.

D.

A black text on a white background AI-generated content may be incorrect.

Question 16

What is contained in the VXLAN header?

Options:

A.

original Layer 2 VLAN ID

B.

Endpoint ID

C.

VXLAN network identifier

D.

source and destination RLOC ID

Question 17

Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.

as

Options:

Question 18

What is the function of an intermediate node in a Cisco SD-Access fabric?

Options:

A.

to route packets within the fabric based on the Layer 3 information in the header

B.

to provide an entry and exit point between the fabric and external resources

C.

to encapsulate and de-encapsulate packets with a VXLAN header

D.

to provide reachability between fabric clients and nonfabric clients on the same subnet

Question 19

Why would an architect use an OSPF virtual link?

Options:

A.

to allow a stub area to transit another stub area

B.

to merge two existing Area 0s through a nonbackbone

C.

to connect two networks that have overlapping private IP address space

D.

to connect a nonbackbone area to Area 0 through another nonbackbone area

Question 20

What is the role of a LISP map server?

Options:

A.

It receives information from ETRs that map EIDs to RLOCs

B.

It transmits requests for EID-to-RLOC resolution

C.

It transmits information from ETRs that map EIDs to RLOCs

D.

It responds to requests for EID-to-RLOC resolution.

Question 21

Drag and drop the automation characteristics from the left to the corresponding tools on the right.

as

Options:

Question 22

Which task Is mandatory when provisioning a device through the plug-and-play workflow in Cisco DNA Center?

Options:

A.

site assignment

B.

slack serial number assignment

C.

golden image upgrade

D.

template configuration application

Question 23

Drag and drop characteristics of PIM dense mode from the left to the right.

as

Options:

Question 24

In Cisco CatalystCenter(formerly DNA Center) Inventory, the Software Version of a networkdevice displays a status of OUTDATED. What does It me?

Options:

A.

There is a later software version available on Cisco Catalyst Center (formerly DNA Center).

B.

The current software image does not match the selected Golden image for this type of network device.

C.

The current type of software image does not match the type of the network device.

D.

There is a later software version available at www.cisco.com website.

Question 25

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

Options:

A.

Cisco Firepower and FireSIGHT

B.

Cisco Stealth watch system

C.

Advanced Malware Protection

D.

Cisco Web Security Appliance

Question 26

An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?

Options:

A.

event manager applet ENABLE_OSPF_DEBUGevent syslog pattern "%OSPF-1-ADJCHG: Process 5. Nbr 1.1.1.1 on SerialO/0 from FULL to DOWN"action 1.0 cli command "debug ip ospf event"action 2.0 cli command "debug ip ospf adj"action 3.0 syslog priority informational msg "ENABLE_OSPF_DEBUG

B.

event manager applet ENABLEOSPFDEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 5, Nbr 1.1.1.1 on SerialO/0 from LOADING to FULL"action 1.0 cli command "debug ip ospf event"action 2.0 cli command "debug ip ospf adj"action 3.0 syslog priority informational msg "ENABLE JDSPF_DEBUG"

C.

event manager apple! ENABLE OSPFDEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 5. Nbr 1.1.1.1 on SerialO/0 from LOADING to FULL"action 1.0 cli command "enable"action 2.0 cli command "debug ip ospf event"action 3.0 cli command "debug ip ospf adj"action 4.0 syslog priority informational msg "ENABLE_OSPFJ} EBUG"

D.

event manager applet ENABLE_OSPF_DEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 6. Nbr 1.1.1.1 on SerialO/0 from FULL to DOWN"action 1.0 cli command "enable"action 2.0 cli command "debug ip ospf event"action 3.0 cli command "debug ip ospf adj"action 4.0 syslog priority informational msg "ENABLE_OSPF_DEBUG'*

Question 27

What is a characteristics of a type 1 hypervisor?

Options:

A.

It runs on top of the host operating system.

B.

It is preferred for supporting nonproduction workloads.

C.

It has greater latency than a Type 2 hypervisor.

D.

It runs on top of bare metal servers.

Question 28

Which unit of measure is used to measure wireless RF SNR?

Options:

A.

mw

B.

dbm

C.

db

D.

dBi

Question 29

What is a benefit of implementing stateful switchover?

Options:

A.

modularity

B.

resiliency

C.

flexibilityD scalability

Question 30

What is a benefit of data modeling languages like YANG?

Options:

A.

They enable programmers to change or write their own application within the device operating system.

B.

They create more secure and efficient SNMP OIDs.

C.

They make the CLI simpler and more efficient.

D.

They provide a standardized data structure, which results in configuration scalability and consistency.

Question 31

Which solution supports end-to-end line-rate encryption between two sites?

Options:

A.

TrustSec

B.

MACsec

C.

IPsec

D.

GRE

Question 32

Which device makes the decision for a wireless client to roam?

Options:

A.

wireless client

B.

Wireless LAN controller

C.

access point

D.

WCS location server

Question 33

Which two nodes comprise a collapsed core in a two-tier Cisco SD-Access design? (Choose two.)

Options:

A.

edge nodes

B.

distribution nodes

C.

extended nodes

D.

core nodes

E.

border nodes

Question 34

Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?

Options:

A.

event manager applet ondemand

event register

action 1.0 syslog priority critical msg 'This is a message from ondemand'

B.

event manager applet ondemand

event manual

action 1.0 syslog priority critical msg 'This is a message from ondemand'

C.

event manager applet ondemand

event none

action 1.0 syslog priority critical msg 'This is a message from ondemand'

D.

event manager applet ondemand

action 1.0 syslog priority critical msg 'This is a message from ondemand'

Question 35

Drag and drop the characteristics from the left into the orchestration tools that they describe on the right.

as

Options:

Question 36

Which feature provides data-plane security for Cisco Catalyst SD-WAN networks'?

Options:

A.

IPsec

B.

SSH

C.

IPS

D.

TLS/DTLS

Question 37

Which characteristics applies to Cisco SD-Access?

Options:

A.

It uses dynamic routing to discover and provision the border and edge switches

B.

It uses VXLAN for the control plane

C.

It uses PnP to discover and provision border and access switches

D.

It uses GRE tor me policy plane

Question 38

What is a TLOC in a Cisco SD-WAN deployment?

Options:

A.

value that identifies a specific tunnel within the Cisco SD-WAN overlay

B.

identifier that represents a specific service offered by nodes within the Cisco SD-WAN overlay

C.

attribute that acts as a next hop for network prefixes

D.

component set by the administrator to differentiate similar nodes that offer a common service

Question 39

How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?

Options:

A.

Add a timestamp to the request in the API header.

B.

Use a password hash.

C.

Add OAuth to the request in the API header.

D.

Use HTTPS.

Question 40

An engineer is implementing a new SSID on a Cisco Catalyst 9800 Series WLC that must be broadcast on 6 GHz radios. Users will be required to use EAP-TLS to authenticate. Which wireless Layer 2 security method is required?

Options:

A.

WPA3 Personal

B.

WPA3 Enterprise

C.

WPA3 Enterprise

D.

WPA2 Personal

Question 41

What is the name of the numerical relationship of the wireless signal compared to the noise floor?

Options:

A.

SNR

B.

RSSI

C.

EIRP

D.

gain

Question 42

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

•LocationA -72dBm

• Location B:-75 dBm

• Location C; -65 dBm

• Location D -80 dBm

Which two statements does the engineer use to explain these values to the customer? (Choose two.)

Options:

A.

The signal strength at location B is 10 dB better than location C.

B.

The signal strength at location C is too weak to support web surfing

C.

Location D has the strongest RF signal strength.

D.

The RF signal strength at location B is 50% weaker than location A.

E.

The RF signal strength at location C is 10 times stronger than location B

Question 43

An engineer is reviewing a PCAP file that contains a packet capture of a four-way handshake exchange between a dient and AP using WPA2 Enterprise Which EAPOL message validates and confirms that the client device has successfully Installed the GTK?

Options:

A.

M4-Message

B.

M3-Message

C.

M2-Message

D.

M1-Message

Question 44

Which technology collects location information through data packets received by the APs instead of using mobile device probes?

Options:

A.

detect and locate

B.

FastLocate

C.

hyperlocation

D.

RF fingerprinting

Question 45

Which framework is used for third-party authorization?

Options:

A.

API keys

B.

custom tokens

C.

OAuth

D.

SOAP

Question 46

What is two characteristic of Cisco DNA Center and vManage northbound APIs?

Options:

A.

They exchange XML-formatted content

B.

They exchange JSON-kxmatted content.

C.

They implement the RESTCONF protocol.

D.

They implement the NETCONF protocol.

E.

They exchange protobuf-formatted content.

Question 47

What is a characteristic of an AP that operates in FlexConnect mode?

Options:

A.

Configuration is done directly on the AP rather than on a controller.

B.

Dot1x authentication is not supported for AP clients in this mode.

C.

Client authentication is always performed on the A P.

D.

FlexConnect groups are required to support 802.11 r fast roaming.

Question 48

Which feature allows clients to perform Layer 2 roaming between wireless controllers?

Options:

A.

SSO

B.

N+1 high availably

C.

mobility groups

D.

RF grouping

Question 49

Which DNS record type is needed to allow a Cisco AP to discover a WLC when using IPv4?

Options:

A.

CNAME record

B.

A record

C.

NS record

D.

SOA record

Question 50

How does NETCONF YANG represent data structures?

Options:

A.

as strict data structures defined by RFC 6020

B.

in an XML tree format

C.

In an HTML format

D.

as modules within a tree

Question 51

as

as

Options:

Question 52

as

as

as

Options:

Question 53

as

as

Options:

Question 54

as

as

Options:

Question 55

as

as

Options:

Question 56

as

as

Options:

Question 57

as

as

Options:

Question 58

as

as

Options:

Question 59

as

as

Options:

Question 60

as

as

Options:

Question 61

as

as

Options:

Question 62

as

as

Options:

Question 63

as

as

as

Options:

Question 64

as

as

Options:

Question 65

as

as

Options:

Question 66

as

as

Options:

Question 67

as

as

Options:

Question 68

as

as

Options:

Question 69

as

as

Options:

Question 70

as

as

as

as

Options:

Question 71

as

as

Options:

Question 72

as

as

Options:

Question 73

as

as

Options:

Question 74

as

OR

as

as

Options:

Question 75

as

as

Options:

Question 76

as

as

Options:

Question 77

as

as

Options:

Question 78

as

as

Options:

Question 79

as

Options:

Page: 1 / 34
Total 335 questions