Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Cisco 350-401 Dumps

Page: 1 / 39
Total 393 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

What are two benefits of using Cisco TrustSec? (Choose two.)

Options:

A.

unknown file analysis using sandboxing

B.

advanced endpoint protection against malware

C.

end-to-end traffic encryption

D.

simplified management of network access

E.

consistent network segmentation

Question 2

Drag and drop the wireless elements on the left to their definitions on the right.

as

Options:

Question 3

What happens when a FlexConnect AP changes to standalone mode?

Options:

A.

All client roaming continues to work.

B.

All controller-dependent activities stop working except the DFS.

C.

Only clients on central switching WLANs stay connected.

D.

All clients on all WLANs are disconnected.

Question 4

Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.

as

Options:

Question 5

An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WLAN Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on then OLTIs?

Options:

A.

over the DS

B.

adaptive R

C.

802.11V

D.

802.11k

Question 6

as

Refer to the exhibit. What is achieved by this Python script?

Options:

A.

It configures access list statements

B.

It reads access list statements into a dictionary list

C.

It displays access list statements on a terminal screen.

D.

It converts access list statements to a human-readable format.

Question 7

When does a Cisco StackWise primary switch lose its role?

Options:

A.

when a stack member fails

B.

when the stack primary is reset

C.

when a switch with a higher priority is added to the stack

D.

when the priority value of a stack member is changed to a higher value

Question 8

Drag and drop the command snippets from the right onto the boxes to create an EEM applet that will enable interface LoopbackO when the logging message 'Interface LoopbackO. changed state to administratively down" is received. Not all commands are used and some commands are used more than once.

as

Options:

Question 9

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

•LocationA -72dBm

• Location B:-75 dBm

• Location C; -65 dBm

• Location D -80 dBm

Which two statements does the engineer use to explain these values to the customer? (Choose two.)

Options:

A.

The signal strength at location B is 10 dB better than location C.

B.

The signal strength at location C is too weak to support web surfing

C.

Location D has the strongest RF signal strength.

D.

The RF signal strength at location B is 50% weaker than location A.

E.

The RF signal strength at location C is 10 times stronger than location B

Question 10

Which architectural component enables a zero-trust security model?

Options:

A.

management plane

B.

plug-and-play

C.

data plane

D.

control plane

Question 11

Which method is used by an AP to join HA controllers and is configured in NVRAM?

Options:

A.

Primary/Secondary- Tertiary/Backup

B.

stored WLC information

C.

DNS

D.

IP Helper Addresses

Question 12

Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used

as

Options:

Question 13

A wireless network engineer must configure a WPA2+WPA3 policy with the Personal security type. Which action meets this requirement?

Options:

A.

Configure the GCMP256 encryption cipher.

B.

Configure the CCMP128 encryption cipher.

C.

Configure the GCMP128 encryption cipher.

D.

Configure the CCMP256 encryption cipher.

Question 14

Which protocol does Cisco Catalyst Center (formerly DNA Center) SDK use to discover the topology of non-Cisco devices in a network?

Options:

A.

CDP

B.

LLDP

C.

Telnet

D.

SSH

Question 15

What is one advantage of using a data modeling language to develop an API client application?

Options:

A.

Increase in compatibility

B.

easier feature extensibility

C.

stronger security properties

D.

lower resource requirements

Question 16

What is the measure of the difference between the received signal and the noise floor in a wireless environment?

Options:

A.

XOR

B.

RSSI

C.

RRM

D.

SNR

Question 17

Which nodes require VXLAN encapsulation support In a Cisco SD-Access deployment?

Options:

A.

core nodes

B.

distribution nodes

C.

border nodes

D.

aggregation nodes

Question 18

Refer to the exhibit. An engineer must adjust the configuration so that Router A becomes the active router. Which commands should be applied to router A? (Choose two)

as

Options:

A.

vrrp 1 priority 90

B.

vrrp 1 timers advertise 1

C.

vrrp lip 10.1.0.11

D.

ip address 10.1.0.11 255.0.0.0

E.

vrrp 1 priority 120

Question 19

Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?

Options:

A.

ingress tunnel router

B.

map resolver

C.

egress tunnel router

D.

map server

Question 20

What is a TLOC in a Cisco SD-WAN deployment?

Options:

A.

value that identifies a specific tunnel within the Cisco SD-WAN overlay

B.

identifier that represents a specific service offered by nodes within the Cisco SD-WAN overlay

C.

attribute that acts as a next hop for network prefixes

D.

component set by the administrator to differentiate similar nodes that offer a common service

Question 21

What is one primary REST security design principle?

Options:

A.

fail-safe defaults

B.

password hash

C.

adding a timestamp in requests

D.

OAuth

Question 22

A network administrator is preparing a Python script to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running. Which operation of the NC client manager prevents colleagues from making changes to the devices while the script is running?

Options:

A.

m.freeze(config-running')

B.

m.freeze(target-running')

C.

m.lock(config='running')

D.

m.lock(target-running')

Question 23

Drag and drop the characteristics from the left onto the corresponding orchestration tool on the right.

as

Options:

Question 24

as

Refer to the exhibit. Drag and drop the snippets into the RESTCONF request to form the request that returns this response. Not all options are used.

as

Options:

Question 25

A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?

Options:

A.

Identity PSK

B.

Fast Transition

C.

Central Web Authentication

D.

Cisco Centralized Key Management

Question 26

What is required for a VXLAN tunnel endpoint to operate?

Options:

A.

a VXLAN tunnel endpoint identifier

B.

at least one Layer 2 interface and one Layer 3 interlace

C.

at least one IP for the transit network and one IP for endpoint connectivity

D.

a VXLAN network identifier

Question 27

Which action reduces sticky clients in dense RF environments?

Options:

A.

Decrease radio channel widths to 40 MHz.

B.

Increase the mandatory minimum data rates.

C.

Decrease the mandatory minimum data rates.

D.

Increase radio channel widths to 160 MHz.

Question 28

What is the recommended minimum SNR for data applications on wireless networks?

Options:

A.

15

B.

20

C.

25

D.

10

Question 29

Which tag defines the properties to be applied to each specific WLAN?

Options:

A.

RF tag

B.

policy tag

C.

AP tag

D.

site tag

Question 30

What is an advantage of utilizing data models in a multivendor environment?

Options:

A.

facilitating a unified approach to configuration and management

B.

improving communication security with binary-encoded protocols

C.

lowering CPU load incurred to managed devices

D.

removing the distinction between configuration and runtime state data

Question 31

Which A record type should be configured for access points to resolve the IP address of a wireless LAN controller using DNS?

Options:

A.

CISCO.CONTROLLER.Iocaldomain

B.

CISCO.CAPWARCONTROLLERJocaldomain

C.

CISCO-CONTROLLER.Iocaldomain

D.

CISCO-CAPWAP-CONTROLLER.Iocaldomain

Question 32

In a Cisco SD-Access network architecture, which access layer cabling design is optimal for the underlay network?

Options:

A.

Switches are cross-finned at the same layer and have a single connection to each upstream distribution device

B.

Switches are connected to each upstream distribution and core device.

C.

Switches are connected to each upstream distribution device.

D.

Switches are cross-linked to devices at the same layer and at the upstream and downstream devices.

Question 33

Refer to the exhibit.

as

Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 34

Refer to the exhibit.

as

Which JSON syntax is derived from this data?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 35

Which mobility role is assigned to a client in the client table of the new controller after a Layer 3 roam?

Options:

A.

anchor

B.

foreign

C.

mobility

D.

transparent

Question 36

Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two.)

Options:

A.

custom headers

B.

authentication

C.

authorization

D.

request management

E.

accounting

Question 37

What are two best practices when designing a campus Layer 3 infrastructure? (Choose two.)

Options:

A.

Summarize routes from the aggregation layer toward the core layer.

B.

Summarize from the access layer toward the aggregation layer.

C.

Configure passive-interface on nontransit links.

D.

Implement security features at the core.

E.

Tune Cisco Express Forwarding load balancing hash for ECMP routing.

Question 38

Which feature provides data-plane security for Cisco Catalyst SD-WAN networks'?

Options:

A.

IPsec

B.

SSH

C.

IPS

D.

TLS/DTLS

Question 39

Which solution should be used in a high-density wireless environment to increase bandwidth for each user?

Options:

A.

Increase antenna size.

B.

Increase the cell size of each AP.

C.

Increase the mandatory minimum data rate.

D.

Increase TX power.

Question 40

Which definition describes JWT in regard to REST API security?

Options:

A.

an encrypted JSON token that is used for authentication

B.

an encrypted JSON token that is used for authorization

C.

an encoded JSON token that is used to securely exchange information

D.

an encoded JSON token that is used for authentication

Question 41

Drag and drop the characteristics from the left onto the orchestration tools they describe on the right.

as

Options:

Question 42

What does a YANG model provide?

Options:

A.

standardized data structure independent of the transport protocols

B.

creation of transport protocols and their interaction with the OS

C.

user access to interact directly with the CLI of the device to receive or modify network configurations

D.

standardized data structure that can be used only with NETCONF or RESTCONF transport protocols

Question 43

as

Refer to the exhibit. What is determined from the output?

Options:

A.

10.0.0.100 is managed by Cisco Catalyst Center (formerly DNA Center).

B.

The URL for the second query is syntactically incorrect.

C.

The authentication for the second query fails.

D.

10.0.0.200 is known to DNA Center, but its ID is an empty string.

Question 44

What is the structure of a JSON web token?

Options:

A.

header and payload

B.

three parts separated by dots: version, header, and signature

C.

payload and signature

D.

three parts separated by dots: header, payload. and signature

Question 45

as

Refer to the exhibit. The existing configuration must be updated to terminate all EXEC sessions after 120 minutes. Which command set should be applied?

Options:

A.

line vty 0 15session-limit 120

B.

line vty 0 15exec-timeout 120

C.

line vty 0 15absolute-timeout 120

D.

line vty 0 15session-timeout 120

Question 46

Drag and drop the automation characteristics from the left to the corresponding tools on the right.

as

Options:

Question 47

Which framework is used for third-party authorization?

Options:

A.

API keys

B.

custom tokens

C.

OAuth

D.

SOAP

Question 48

In a Cisco SD-Access wireless architecture, which device manages endpoint ID to edge node bindings?

Options:

A.

fabric control plane node

B.

fabric edge node

C.

fabric border node

D.

fabric wireless controller

Question 49

Which type of API enables Cisco Catalyst Center (formerly DNA Center) to focus on outcome instead of the individual steps that are required to achieve the outcome?

Options:

A.

southbound Multivendor Support

B.

westbound Integration

C.

northbound Intent

D.

eastbound Events and Notifications

Question 50

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?

Options:

A.

EIRP

B.

mW

C.

dBm

D.

dBi

Question 51

Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used.

as

Options:

Question 52

Which tag defines the roaming domain and properties of an AP deployment?

Options:

A.

RF tag

B.

policy tag

C.

site tag

D.

AP tag

Question 53

An engineer must configure a new WLAN that supports 802.11r and requires users to enter a passphrase. What must be configured to support this requirement?

Options:

A.

802.1XandSUITEB-1X

B.

FT PSK and Fast Transition

C.

802.1X and Fast Transition

D.

FTPSKandSUITEB-1X

Question 54

Refer to the exhibit.

as

A client requests a new SSID that will use web-based authentication and external RADIUS servers. Which Layer 2 security mode must be selected?

Options:

A.

Static WEP

B.

WPA2 + WPA3

C.

None

D.

WPA + WPA2

Question 55

Which technology collects location information through data packets received by the APs instead of using mobile device probes?

Options:

A.

detect and locate

B.

FastLocate

C.

hyperlocation

D.

RF fingerprinting

Question 56

An engineer is implementing a new SSID on a Cisco Catalyst 9800 Series WLC that must be broadcast on 6 GHz radios. Users will be required to use EAP-TLS to authenticate. Which wireless Layer 2 security method is required?

Options:

A.

WPA3 Personal

B.

WPA3 Enterprise

C.

WPA3 Enterprise

D.

WPA2 Personal

Question 57

as

Refer to the exhibit. What is the value of the variable list after the code is run?

Options:

A.

[1, 2, 10]

B.

[1, 2, 3, 10]

C.

[1, 2, 10, 4]

D.

[1, 10, 10, 10]

Question 58

What are two benefits of virtualizing the server with the use of VMs in a data center environment? (Choose two.)

Options:

A.

smaller Layer 2 domain

B.

speedy deployment

C.

increased security

D.

reduced IP and MAC address requirements

E.

reduced rack space, power, and cooling requirements

Question 59

Which DNS record type is needed to allow a Cisco AP to discover a WLC when using IPv4?

Options:

A.

CNAME record

B.

A record

C.

NS record

D.

SOA record

Question 60

as

as

Options:

Question 61

as

as

Options:

Question 62

as

as

Options:

Question 63

as

as

Options:

Question 64

as

as

Options:

Question 65

as

as

as

Options:

Question 66

as

as

Options:

Question 67

as

as

Options:

Question 68

as

as

Options:

Question 69

as

as

Options:

Question 70

as

as

Options:

Question 71

as

as

Options:

Question 72

as

as

Options:

Question 73

as

as

Options:

Question 74

as

as

Options:

Question 75

as

as

Options:

Question 76

as

as

Options:

Question 77

as

as

Options:

Question 78

as

as

Options:

Question 79

as

as

Options:

Question 80

as

as

Options:

Question 81

as

as

as

Options:

Question 82

as

as

as

as

Options:

Question 83

as

OR

as

as

Options:

Question 84

as

as

Options:

Question 85

as

as

Options:

Question 86

as

as

Options:

Question 87

as

as

Options:

Question 88

as

Options:

Page: 1 / 39
Total 393 questions