Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Cisco 350-401 Dumps Questions Answers

Page: 1 / 14
Total 258 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Question 1

A script contains the statement white loop != 999 ’ Which value terminates the loop?

Options:

A.

A value equal to 999.

B.

A value not equal to 999.

C.

A value greater than or equal to 999.

D.

A value less than or equal to 999.

Buy Now
Question 2

What is the purpose of data modeling languages?

Options:

A.

to describe a data schema convertible into any data encoding format

B.

to specify algorithms necessary to decode binary-encoded protocol data units

C.

to translate encoded data for interoperability between different CPU architectures

D.

to provide a framework to describe data flow patterns in networks

Question 3

Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used

Options:

Question 4

Which data is properly formatted with JSON?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 5

An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?

Options:

A.

EAP-TLS

B.

EAP-FAST

C.

LDAP

D.

PEAP

Question 6

Which solution simplifies management of secure access to network resources?

Options:

A.

TrustSec to logically group internal user environments and assign policies

B.

ISE to automate network access control leveraging RADIUS AV pairs

C.

RFC 3580-based solution to enable authenticated access leveraging RADIUS and AV pairs

D.

802 1AE to secure communication in the network domain

Question 7

Which method ensures the confidentiality of data exchanged over a REST API?

Options:

A.

Use TLS to secure the underlying HTTP session.

B.

Use me POST method Instead or URL-encoded GET to pass parameters.

C.

Deploy digest-based authentication to protect the access to the API.

D.

Encode sensitive data using Base64 encoding.

Question 8

What is a characteristic of VRRP?

Options:

A.

It inherently balances load amongst the available gateways.

B.

It ensures symmetric traffic flow upstream and downstream.

C.

It Is a Cisco proprietary protocol.

D.

It uses a virtual IP address and a virtual MAC address to achieve redundancy

Question 9

What is used by vManage to interact with Cisco SD-WAN devices in the fabric?

Options:

A.

northbound API

B.

RESTCONF

C.

Southbound API

D.

IPsec

Question 10

An engineer is reviewing a PCAP file that contains a packet capture of a four-way handshake exchange between a client and AP using WPA2 Enterprise Which EAPOL message validates and confirms that the client device has successfully Installed the GTK?

Options:

A.

M4-Message

B.

M3-Message

C.

M2-Message

D.

M1-Message

Question 11

To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?

Options:

A.

security ft adaptive

B.

security wpa akm dotlx

C.

security wpa akm psk

D.

security wpa akm ft psk

Question 12

How does SSO work with HSRP to minimize network disruptions?

Options:

A.

It enables HSRP to elect another switch in the group as the active HSRP switch.

B.

It ensures fast failover in the case of link failure.

C.

It enables data forwarding along known routes following a switchover, white the routing protocol reconverges.

D.

It enables HSRP to failover to the standby RP on the same device.

Question 13

Refer to the exhibit Which command set is required on router R1 to allow the network administrator to authenticate via RADIUS'?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 14

Refer to the exhibit.

Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 15

Which nodes require VXLAN encapsulation support In a Cisco SD-Access deployment?

Options:

A.

core nodes

B.

distribution nodes

C.

border nodes

D.

aggregation nodes

Question 16

Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 17

What is the function of an intermediate node in a Cisco SD-Access fabric?

Options:

A.

to route packets within the fabric based on the Layer 3 information in the header

B.

to provide an entry and exit point between the fabric and external resources

C.

to encapsulate and de-encapsulate packets with a VXLAN header

D.

to provide reachability between fabric clients and nonfabric clients on the same subnet

Question 18

What does the statement print(format(0.8, \0%')) display?

Options:

A.

80%

B.

8.8%

C.

.08%

D.

8%

Question 19

Refer to the exhibit An engineer is troubleshooting an issue with non-Wi-Fi interference on the 5-GHz band The engineer has enabled Cisco CleanAir and set the appropriate traps, but the AP does not change the channel when it detects significant interference Which action will resolve the issue?

Options:

A.

Enable the Avoid Persistent Non-WiFi Interference option

B.

Disable the Avoid Foreign AP Interference option.

C.

Change the DCA Sensitivity option to High

D.

Enable the Event Driven Radio Resource Management option

Question 20

Which data format can be used for an API request?

Options:

A.

HTML

B.

PERL

C.

JSON

D.

Python

Question 21

Which two operations are valid for RESTCONF? (Choose two)

Options:

A.

PULL

B.

ADD

C.

HEAD

D.

REMOVE

E.

GET

F.

PUSH

Question 22

Which AP mode analyzes the spectrum to detect sources of interference?

Options:

A.

Monitor

B.

Rogue detector

C.

SE-Connect

D.

Sniffer

Question 23

How is Layer 3 roaming accomplished in a unified wireless deployment?

Options:

A.

An EoIP tunnel is created between the client and the anchor controller to provide seamless connectively as the client is associated with the new AP.

B.

The client entry on the original controller is passed to the database on the new controller.

C.

The new controller assign an IP address from the new subnet to the client.

D.

The client database on the original controller is updated with the anchor entry, and the new controller database is updated with the foreign entry.

Question 24

Which RF value represents the decline of the RF signal amplitude over a given distance"?

Options:

A.

signal-to-noise ratio

B.

received signal strength indicator

C.

free space path loss

D.

effective isotropic radiated power

Question 25

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

•LocationA -72dBm

• Location B:-75 dBm

• Location C; -65 dBm

• Location D -80 dBm

Which two statements does the engineer use to explain these values to the customer? (Choose two.)

Options:

A.

The signal strength at location B is 10 dB better than location C.

B.

The signal strength at location C is too weak to support web surfing

C.

Location D has the strongest RF signal strength.

D.

The RF signal strength at location B is 50% weaker than location A.

E.

The RF signal strength at location C is 10 times stronger than location B

Question 26

Which features does Cisco EDR use to provide threat detection and response protection?

Options:

A.

containment, threat intelligence, and machine learning

B.

firewalling and intrusion prevention

C.

container-based agents

D.

cloud analysts and endpoint firewall controls

Question 27

Which tag defines the roaming domain and properties of an AP deployment?

Options:

A.

RF tag

B.

policy tag

C.

site tag

D.

AP tag

Question 28

Drag and drop the characteristics of Cisco Catalyst SD-WAN from the left onto the right. Not all options are used.

Options:

Question 29

Options:

Question 30

Options:

Question 31

OR

Options:

Question 32

Options:

Question 33

Options:

Question 34

Options:

Question 35

Options:

Question 36

Options:

Question 37

Options:

Question 38

Options:

Question 39

Options:

Question 40

Options:

Question 41

Options:

Question 42

Options:

Question 43

Options:

Question 44

Options:

Question 45

Options:

Question 46

Options:

Question 47

Options:

Question 48

Options:

Question 49

Options:

Question 50

Options:

Question 51

Options:

Question 52

Options:

Question 53

Options:

Question 54

Options:

Question 55

Options:

Question 56

Options:

Page: 1 / 14
Total 258 questions