Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers
OR
Which data is properly formatted with JSON?
An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?
Which two operations are valid for RESTCONF? (Choose two)
Which function does a Cisco SD-Access extended node perform?
In a Cisco SD-Access network architecture, which access layer cabling design is optimal for the underlay network?
What is the API keys option for REST API authentication?
What is the intent API in Cisco Catalyst Center (formerly DNA Center)?
Which definition describes JWT in regard to REST API security?
What is YANG used for?
What is an advantage of utilizing data models in a multivendor environment?
What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?
What is a characteristic of a traditional WAN?
A company recently decided to use RESTCONF instead of NETCONF. and many of their NETCONF scripts contain the operation
Which method does FastLocate use to collect location-based information?
Reler to the exhibit. An engineer configuring WebAuth on a Cisco Catalyst 9000 Series WIC. The engineer has purchased a third-party certificate using the FQDN of the WLC as the CN and intends to use bit on the WebAuth splash page What must be configured so that the clients do not receive a certificate error?
Which type of roaming event occurs when a client roams across multiple mobility groups?
Refer to the exhibit. What is the value of the variable list after the code is run?
Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two.)
In a campus network design, what are two benefits of using BFD for failure detection'? (Choose two.)
What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?
Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.
Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two.)
An engineer is reviewing a PCAP file that contains a packet capture of a four-way handshake exchange between a dient and AP using WPA2 Enterprise Which EAPOL message validates and confirms that the client device has successfully Installed the GTK?
What is the JSON syntax that is formed from the data?
In a Cisco SD-Access wireless architecture, which device manages endpoint ID to edge node bindings?
Which network design principle should be followed to improve Layer 2 stability in an enterprise campus design?
Refer to the exhibit.
Which action must be taken to configure a WLAN for WPA2-AES with PSK and allow only 802.11r-capable clients to connect?
Which language can be used to model configuration and state data?