Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Enterprise > 350-401

350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Question and Answers

Question # 4

Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used

Full Access
Question # 5

What are two benefits of virtualizing the server with the use of VMs in a data center environment? (Choose two.)

A.

smaller Layer 2 domain

B.

speedy deployment

C.

increased security

D.

reduced IP and MAC address requirements

E.

reduced rack space, power, and cooling requirements

Full Access
Question # 6

Refer to the exhibit.

An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 7

Which location tracking method is used when locating client devices using Cisco hyperlocation?

A.

angle of arrival

B.

location patterning

C.

TTL

D.

line of sight

Full Access
Question # 8

Drag and drop the Cisco Catalyst Center (formerly DNA Center) southbound API characteristics from the left to the right. Not all options are used.

Full Access
Question # 9

Which data is properly formatted with JSON?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 10

With IGMPv2, which multicast group address does the IGMP querier use to send query messages to all hosts on the LAN?

A.

239.0.0.2

B.

224.0.0.1

C.

239.0.0.1

D.

224.0.0.2

Full Access
Question # 11

A wireless administrator must create a new web authentication corporate SSID that will be using ISE as the external RADIUS server. The guest VLAN must be specified after the authentication completes. Which action must be performed to allow the ISE server to specify the guest VLAN?

A.

Set RADIUS Profiling.

B.

Set AAA Policy name.

C.

Enable Network Access Control State.

D.

Enable AAA Override.

Full Access
Question # 12

Why would a network engineer configure an AP in SE-Connect mode?

A.

to redirect WLAN traffic to an endpoint for protocol analysis

B.

to monitor the VLAN traffic for rogue APs

C.

to connect the wired LAN with the wireless infrastructure

D.

to analyze the RF spectrum surrounding the AP

Full Access
Question # 13

Refer to lhe exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF-capable CiscoIOSXE device that Is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 14

Refer to the exhibit Which command set is required on router R1 to allow the network administrator to authenticate via RADIUS'?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 15

Which data format can be used for an API request?

A.

HTML

B.

PERL

C.

JSON

D.

Python

Full Access
Question # 16

Which mobility role is assigned to a client in the client table of the new controller after a Layer 3 roam?

A.

anchor

B.

foreign

C.

mobility

D.

transparent

Full Access
Question # 17

In a Cisco Mobility Express wireless deployment, which AP takes over if the primary AP fails?

A.

AP with highest IP address

B.

AP with the lowest IP address

C.

AP with highest MAC address

D.

AP with highest controller up time

Full Access
Question # 18

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?

A.

Layer 3

B.

inter-xTR

C.

auto anchor

D.

fast roam

Full Access
Question # 19

Which component transports data plane traffic across a Cisco SD-WAN network?

A.

vSmart

B.

vManage

C.

cEdge

D.

vBond

Full Access
Question # 20

What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?

A.

SSH

B.

TLS

C.

HTTPS

D.

JWT

Full Access
Question # 21

Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.

Full Access
Question # 22

In which two ways does PIM dense mode function in the network? (Choose two.)

A.

It waits to forward multicast traffic until a downstream router requests the traffic.

B.

It utilizes the designated forwarder election to avoid multicast packet loops.

C.

It receives traffic from only one Reverse Path Forwarding interface.

D.

It forwards multicast traffic on all interfaces until a downstream router requests that forwarding stop.

E.

It uses a push method, and fallback occurs when RP information is lost.

Full Access
Question # 23

What is a benefit of MACsec in a multilayered LAN network design?

A.

There is no requirement to run IEEE 802.1X when MACsec is enabled on a switch port.

B.

Layer 2 trunk links between switches can be secured.

C.

Application flows between hosts on the LAN to remote destinations can be encrypted.

D.

Layer 3 links between switches can be secured.

Full Access
Question # 24

What is the responsibility of a secondary WLC?

A.

It avoids congestion on the primary controller by sharing the registration load on the LAPs.

B.

It registers the LAPs if the primary controller fails.

C.

It enables Layer 2 and Layer 3 roaming between itself and the primary controller.

D.

It shares the traffic load of the LAPs with the primary controller

Full Access
Question # 25

What is a characteristic of an AP that operates in FlexConnect mode?

A.

Configuration is done directly on the AP rather than on a controller.

B.

Dot1x authentication is not supported for AP clients in this mode.

C.

Client authentication is always performed on the A P.

D.

FlexConnect groups are required to support 802.11 r fast roaming.

Full Access
Question # 26

What is the recommended minimum SNR for Voice applications for networks?

A.

15

B.

20

C.

25

D.

10

Full Access
Question # 27

Which authorization framework gives third-party applications limited access to HTTP services?

A.

IPsec

B.

GRE

C.

Basic Auth

D.

OAuth 2.0

Full Access
Question # 28

In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)

A.

advertisement of network prefixes and their attributes

B.

configuration of control and data policies

C.

gathering of underlay infrastructure data

D.

delivery of crypto keys

E.

segmentation and differentiation of traffic

Full Access
Question # 29

When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?

A.

Not all of the controllers in the mobility group are using the same mobility group name.

B.

All of the controllers within the mobility group are using the same virtual Interface IP address.

C.

Not all of the controllers within the mobility group are using the same virtual interface IP address.

D.

All of the controllers in the mobility group are using the same mobility group name

Full Access
Question # 30

Drag and drop the characteristics from the left into the orchestration tools that they describe on the right.

Full Access
Question # 31

What is a characteristic of a virtual machine?

A.

It shares the host OS kernel, binaries, and libraries

B.

It is more resource efficient than a container

C.

It provides an environment completely isolated from the host OS

D.

It is more lightweight than a container

Full Access
Question # 32

Full Access
Question # 33

Full Access
Question # 34

Full Access
Question # 35

Full Access
Question # 36

OR

Full Access
Question # 37

Full Access
Question # 38

Full Access
Question # 39

Full Access
Question # 40

Full Access
Question # 41

Full Access
Question # 42

Full Access
Question # 43

Full Access
Question # 44

Full Access
Question # 45

Full Access
Question # 46

Full Access
Question # 47

Full Access
Question # 48

Full Access
Question # 49

Full Access
Question # 50

Full Access
Question # 51

Full Access
Question # 52

Full Access
Question # 53

Full Access
Question # 54

Full Access
Question # 55

Full Access
Question # 56

Full Access
Question # 57

Full Access
Question # 58

Full Access
Question # 59

Full Access