Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

Cisco 350-401 Dumps

Page: 1 / 38
Total 378 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

Which language defines the structure or modelling of data for NETCONF and RESTCONF?

Options:

A.

JSON

B.

YANG

C.

XML

D.

YAML

Question 2

In a high-density AP environment, which feature can be used to reduce the RF cell size and not demodulate radio packets above a given threshold?

Options:

A.

RX-SOP

B.

FRA

C.

80211k

D.

RRM

Question 3

Drag and drop the configuration management tools from the left onto the configuration styles they use on the right

as

Options:

Question 4

as

Refer to lhe exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF-capable CiscoIOSXE device that Is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 5

What is the purpose of a data modeling language?

Options:

A.

to establish a framework to process data by using an object-oriented programming approach

B.

to specify the rules for transcoding between text and binary data encodings

C.

to standardize the procedures that are executed when parsing sent and received data

D.

to describe the structure and meaning of exchanged data

Question 6

What are two device roles in Cisco SD-Access fabric? (Choose two.)

Options:

A.

core switch

B.

vBond controller

C.

edge node

D.

access switch

E.

border node

Question 7

What is a benefit of YANG modules?

Options:

A.

tightly coupled models with encoding to improve performance

B.

easier multivendor interoperability provided by common or industry models

C.

avoidance of ecosystem fragmentation by having fixed modules that cannot be changed

D.

single protocol and model coupling to simplify maintenance and support

Question 8

What is a characteristic of a virtual machine?

Options:

A.

It shares the host OS kernel, binaries, and libraries

B.

It is more resource efficient than a container

C.

It provides an environment completely isolated from the host OS

D.

It is more lightweight than a container

Question 9

What are two methods of ensuring that the multicast RPF check passes without changing the unicast routing table? (Choose two.)

Options:

A.

disabling the interface of the router back to the multicast source

B.

implementing MBGP

C.

disabling BGP routing protocol

D.

implementing static mroutes

E.

implementing OSPF routing protocol

Question 10

Which feature is offered by the Cisco Advanced Malware Protection for Endpoints solution?

Options:

A.

DNS Protection

B.

NetFlow

C.

Trustsec

D.

File Sandboxing

Question 11

What is one characteristic of Cisco Catalyst Center (formerly DNA Center) and vManage northbound APIs?

Options:

A.

They implement the NETCONF protocol.

B.

They push configuration changes down to devices.

C.

They exchange XML-formatted content.

D.

They implement the RESTCONF protocol.

Question 12

as

Refer to the exhibit. Which python code snippet prints the descriptions of disabled interface only?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 13

Drag and drop the code snippets from the bottom onto the blanks in the Python script to convert a Python object into a JSON string. Not all options are used.

as

Options:

Question 14

In a campus network design, what are two benefits of using BFD for failure detection'? (Choose two.)

Options:

A.

BFD speeds up routing convergence time

B.

BFD provides path failure detection in less than a second

C.

BFD provides fault tolerance by enabling multiple routers to appear as a single virtual router

D.

BFD is an efficient way to reduce memory and CPU usage

E.

BFD enables network peers to continue forwarding packets in the event of a restart

Question 15

When deploying a Cisco Unified Wireless solution what is a design justification for using a distributed WLC deployment model?

Options:

A.

It reduces the number of WLCs that network administrators must support by locating them in a common location

B.

It more evenly distributes MAC ARP and ND processing over multiple switches which helps with scalability

C.

The number of wireless clients is low and the size of the physical campus is small

D.

There are no latency concerns about LWAPP and CAPWAP tunnels traversing the campus core network

Question 16

Drag and drop the characteristics of Cisco Catalyst SD-WAN from the left onto the right. Not all options are used.

as

Options:

Question 17

Which language can be used to model configuration and state data?

Options:

A.

JSON

B.

XML

C.

XDR

D.

YANG

Question 18

Which NGFW mode block flows crossing the firewall?

Options:

A.

Passive

B.

Tap

C.

Inline tap

D.

Inline

Question 19

Which type of tunnel is required between two WLCs to enable intercontroller roaming?

Options:

A.

LWAPP

B.

CAPWAP

C.

IPsec

D.

mobility

Question 20

Which next generation firewall feature supports separate security services for multiple departments?

Options:

A.

state sharing mode to .trade the user data sessions and replication to the neighbor firewall using a failover link

B.

Layer 3 mode with resource tracking capabilities and automatic configuration synchronization between the nodes and security zones

C.

multicontext mode with specific logical or physical interface allocation within each context and grouped into security zones

D.

virtual switch mode to provide traffic inspection capabilities for the flows entering the firewall and dropping packets based on policy configuration

Question 21

What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?

Options:

A.

real-time threat management to stop DDoS attacks to the core and access networks

B.

malware control

C.

real-time awareness of users, devices, and traffic on the network

D.

dynamic threat control for web traffic 

Question 22

Which function is performed by vSmart in the Cisco Catalyst SD-WAN architecture?

Options:

A.

facilitation of NAT detection and traversal

B.

redistribution between OMP and other routing protocols

C.

distribution of IPsec keys

D.

execution of localized policies

Question 23

What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?

Options:

A.

It facilitates software upgrades to network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It uses a predefined configuration through parameterized elements or variables.

D.

It provides a high-level overview of the health of every network device.

Question 24

Which three methods does Cisco Catalyst Center (formerly DNA Center) use to discover devices? (Choose three.)

Options:

A.

SNMP

B.

a specified range of IP addresses

C.

NETCONF

D.

LLDP

E.

ping

F.

CDP

Question 25

What is used by vManage to interact withCiscoSD-WAN devices in the fabric?

Options:

A.

northbound API

B.

RESTCONF

C.

Southbound API

D.

IPsec

Question 26

An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?

event manager applet LogMessage

event routing network 172.30.197.0/24 type all

Options:

A.

action 1 syslog send "OSPF ROUTING ERROR"

B.

action 1 syslog pattern "OSPF ROUTING ERROR"

C.

action 1 syslog write "OSPF ROUTING ERROR"

D.

action 1 syslog msg "OSPF ROUTING ERROR"

Question 27

What is a characteristic of VXLAN?

Options:

A.

It extends Layers 2 and Layer 3 overlay network over a Layer 2 underly.

B.

It has a 12-byte packet header.

C.

Its frame encapsulation is performed by MAC-in-UDP.

D.

It uses TCP for transport

Question 28

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?

Options:

A.

ISE server

B.

local WLC

C.

RADIUS server

D.

anchor WLC

Question 29

In a Cisco SD-Access network architecture, which access layer cabling design is optimal for the underlay network?

Options:

A.

Switches are cross-finned at the same layer and have a single connection to each upstream distribution device

B.

Switches are connected to each upstream distribution and core device.

C.

Switches are connected to each upstream distribution device.

D.

Switches are cross-linked to devices at the same layer and at the upstream and downstream devices.

Question 30

Drag and drop the automation characteristics from the left to the corresponding tools on the right.

as

Options:

Question 31

Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request that configures a deny rule on an access list?

as

Options:

Question 32

Drag and drop the code snippets from the bottom onto blanks m the Python script so that the program changes the IP address and saves It as a new JSON Me on the disk Not all options are used

as

Options:

Question 33

An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionally?

Options:

A.

CCKM

B.

WPA2 policy

C.

Local Policy

D.

Web Policy

Question 34

Which method ensures the confidentiality of data exchanged over a REST API?

Options:

A.

Use TLS to secure the underlying HTTP session.

B.

Use me POST method Instead or URL-encoded GET to pass parameters.

C.

Deploy digest-based authentication to protect the access to the API.

D.

Encode sensitive data using Base64 encoding.

Question 35

as

Refer to the exhibit. The existing configuration must be updated to terminate all EXEC sessions after 120 minutes. Which command set should be applied?

Options:

A.

line vty 0 15

session-limit 120

B.

line vty 0 15

exec-timeout 120

C.

line vty 0 15

absolute-timeout 120

D.

line vty 0 15

session-timeout 120

Question 36

as

Refer to the exhibit A network engineer must use a Python script lo convert data received from a network device. Which type of data is printed to the console when the script runs?

Options:

A.

dictionary with a key-value pair

B.

list of lists

C.

list of strings

D.

tuple list

Question 37

What is one method for achieving REST API security?

Options:

A.

using a MD5 hash to verify the integrity

B.

using built-in protocols known as Web Services Security

C.

using HTTPS and TLS encryption

D.

using a combination of XML encryption and XML signatures

Question 38

What is a characteristic of Layer 3 roaming?

Options:

A.

Clients must obtain a new IP address when they roam between APs.

B.

It provides seamless roaming between APs that are connected to different Layer 3 networks and different mobility groups.

C.

It is only supported on controllers that run SSO.

D.

It provides seamless client roaming between APs in different Layer 3 networks but within the same mobility group.

Question 39

Which deployment option of Cisco NGFW provides scalability?

Options:

A.

tap

B.

inline tap

C.

high availability

D.

clustering

Question 40

An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement?

Options:

A.

RF

B.

WLAN

C.

Policy

D.

Flex

Question 41

What is the VXLAN network identifier used to identify?

Options:

A.

network tunnel interface

B.

IP subnet

C.

virtual tunnel endpoint

D.

broadcast domain

Question 42

as

What is the JSON syntax that is formed the data?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 43

What are two characteristics of a directional antenna? (Choose two.)

Options:

A.

high gain

B.

receive signals equally from all directions

C.

commonly used to cover large areas

D.

provides the most focused and narrow beam width

E.

low gain

Question 44

Which security feature does stateless authentication and authorization use for REST API calls?

Options:

A.

OAuth 2 tokens

B.

cookie-based session authentication

C.

API keys

D.

SSL/TLS certificate encryption

Question 45

Which AP mode allows an engineer to scan configured channels for rogue access points?

Options:

A.

sniffer

B.

monitor

C.

bridge

D.

local

Question 46

Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity?

Options:

A.

802. 1d

B.

802.1x

C.

802.1q

D.

802.1w

Question 47

as

Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 48

Which method requires a client to authenticate and has the capability to function without encryption?

Options:

A.

open

B.

WEP

C.

WebAuth

D.

PSK

Question 49

as

Refer to the exhibit. Which result does the python code achieve?

Options:

A.

The code encrypts a base64 decrypted password.

B.

The code converts time to the "year/month/day" time format.

C.

The code converts time to the yyyymmdd representation.

D.

The code converts time to the Epoch LINUX time format.

Question 50

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 51

Ascriptcontainsthe statement white loop != 999 ’ Which value terminates the loop?

Options:

A.

A value equal to 999.

B.

A value not equal to 999.

C.

A value greater than or equal to 999.

D.

A value less than or equal to 999.

Question 52

What is the role of a LISP map server?

Options:

A.

It receives information from ETRs that map EIDs to RLOCs

B.

It transmits requests for EID-to-RLOC resolution

C.

It transmits information from ETRs that map EIDs to RLOCs

D.

It responds to requests for EID-to-RLOC resolution.

Question 53

Which multicast operational mode sends a prune message to the source when there are no connected members or downstream neighbors?

Options:

A.

PIM sparse mode

B.

PIM dense mode

C.

IGMPv3

D.

IGMPv2

Question 54

Refer to the exhibit.

as

Which JSON syntax is derived from this data?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 55

as

as

Options:

Question 56

as

as

Options:

Question 57

as

as

as

Options:

Question 58

as

OR

as

as

Options:

Question 59

as

as

Options:

Question 60

as

as

Options:

Question 61

as

as

Options:

Question 62

as

as

Options:

Question 63

as

as

Options:

Question 64

as

as

Options:

Question 65

as

as

Options:

Question 66

as

as

as

as

Options:

Question 67

as

as

Options:

Question 68

as

as

Options:

Question 69

as

as

Options:

Question 70

as

as

Options:

Question 71

as

as

Options:

Question 72

as

as

Options:

Question 73

as

as

Options:

Question 74

as

as

Options:

Question 75

as

Options:

Question 76

as

as

Options:

Question 77

as

as

as

Options:

Question 78

as

as

Options:

Question 79

as

as

Options:

Question 80

as

as

Options:

Question 81

as

as

Options:

Question 82

as

as

Options:

Question 83

as

as

Options:

Page: 1 / 38
Total 378 questions