Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Cisco > CCNP Enterprise > 350-401

350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Question and Answers

Question # 4

Full Access
Question # 5

Full Access
Question # 6

OR

Full Access
Question # 7

Full Access
Question # 8

Full Access
Question # 9

Full Access
Question # 10

Full Access
Question # 11

Full Access
Question # 12

Full Access
Question # 13

Full Access
Question # 14

Full Access
Question # 15

Full Access
Question # 16

Full Access
Question # 17

Full Access
Question # 18

Full Access
Question # 19

Full Access
Question # 20

Full Access
Question # 21

Full Access
Question # 22

Full Access
Question # 23

Full Access
Question # 24

Full Access
Question # 25

Which AP mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?

A.

SE-connect mode

B.

sensor mode

C.

client mode

D.

sniffer mode

Full Access
Question # 26

Which design principle states that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?

A.

economy of mechanism

B.

fail-safe defaults

C.

complete mediation

D.

least privilege

Full Access
Question # 27

Refer to the exhibit. Running the script causes the output in the exhibit. What should be the first line of the script?

A.

import manager

B.

ncclient manager import

C.

from ncclient import *

D.

from ncclient import manager

Full Access
Question # 28

Drag and drop the automation characteristics from the left onto the corresponding tools on the right. Not all options are used.

Full Access
Question # 29

What is a client who is using 802.1x for authentication referred to as?

A.

authenticator

B.

policy enforcement point

C.

NAC device

D.

supplicant

Full Access
Question # 30

What is the JSON syntax that is formed the data?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 31

Full Access
Question # 32

Full Access
Question # 33

Which deployment option of Cisco NGFW provides scalability?

A.

tap

B.

inline tap

C.

high availability

D.

clustering

Full Access
Question # 34

Refer to the exhibit. What is the output of this code?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 35

Which method does FastLocate use to collect location-based information?

A.

RFID

B.

client probing

C.

beacons

D.

data packets

Full Access
Question # 36

How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?

A.

Add a timestamp to the request in the API header.

B.

Use a password hash.

C.

Add OAuth to the request in the API header.

D.

Use HTTPS.

Full Access
Question # 37

When deploying a Cisco Unified Wireless solution what is a design justification for using a distributed WLC deployment model?

A.

It reduces the number of WLCs that network administrators must support by locating them in a common location

B.

It more evenly distributes MAC ARP and ND processing over multiple switches which helps with scalability

C.

The number of wireless clients is low and the size of the physical campus is small

D.

There are no latency concerns about LWAPP and CAPWAP tunnels traversing the campus core network

Full Access
Question # 38

Which tool functions in a push model, supports languages like Python or Ruby, and does not require an agent to be installed per host?

A.

Puppet

B.

Ansible

C.

Saltstack

D.

Chef

Full Access
Question # 39

Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.

Full Access
Question # 40

Which unit measures the power of a radio signal with reference to 1 milliwatt?

A.

dBi

B.

mW

C.

dBw

D.

dBm

Full Access
Question # 41

Based on the configuration in this WLAN security setting,Which method can a client use to authenticate to the network?

A.

text string

B.

username and password

C.

certificate

D.

RADIUS token

Full Access
Question # 42

Which message type is valid for IGMPv3?

A.

leave group

B.

hello

C.

graft

D.

source-specific membership report

Full Access
Question # 43

Which two southbound interfaces originate from Cisco Catalyst Center (formerly DNA Center) and terminate at fabric underlay switches'? (Choose two.)

A.

ICMP Discovery

B.

UDP67 DHCP

C.

TCP 23 Telnet

D.

UDP6007 NetFlow

E.

UDP 162 SNMP

Full Access
Question # 44

What are two benefits of virtualizing the server with the use of VMs in a data center environment? (Choose two.)

A.

smaller Layer 2 domain

B.

speedy deployment

C.

increased security

D.

reduced IP and MAC address requirements

E.

reduced rack space, power, and cooling requirements

Full Access
Question # 45

Which DNS record type is needed to allow a Cisco AP to discover a WLC when using IPv4?

A.

CNAME record

B.

A record

C.

NS record

D.

SOA record

Full Access
Question # 46

In which two ways does PIM dense mode function in the network? (Choose two.)

A.

It waits to forward multicast traffic until a downstream router requests the traffic.

B.

It utilizes the designated forwarder election to avoid multicast packet loops.

C.

It receives traffic from only one Reverse Path Forwarding interface.

D.

It forwards multicast traffic on all interfaces until a downstream router requests that forwarding stop.

E.

It uses a push method, and fallback occurs when RP information is lost.

Full Access
Question # 47

What is a TLOC in a Cisco Catalyst SD-WAN deployment?

A.

component set by the administrator to differentiate similar nodes that offer a common service

B.

value that identifies a specific tunnel within the Cisco Catalyst SD-WAN overlay

C.

identifier that represents a specific service offered by nodes within the Cisco Catalyst SD-WAN overlay

D.

attribute that acts as a next hop for network prefixes

Full Access
Question # 48

In Cisco CatalystCenter(formerly DNA Center) Inventory, the Software Version of a networkdevice displays a status of OUTDATED. What does It me?

A.

There is a later software version available on Cisco Catalyst Center (formerly DNA Center).

B.

The current software image does not match the selected Golden image for this type of network device.

C.

The current type of software image does not match the type of the network device.

D.

There is a later software version available at www.cisco.com website.

Full Access
Question # 49

What are two characteristics of a directional antenna? (Choose two.)

A.

high gain

B.

receive signals equally from all directions

C.

commonly used to cover large areas

D.

provides the most focused and narrow beam width

E.

low gain

Full Access
Question # 50

Which action reduces sticky clients in dense RF environments?

A.

Decrease radio channel widths to 40 MHz.

B.

Increase the mandatory minimum data rates.

C.

Decrease the mandatory minimum data rates.

D.

Increase radio channel widths to 160 MHz.

Full Access
Question # 51

Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?

A.

GLBP

B.

HSRP v2

C.

VRRP

D.

HSRP v1

Full Access
Question # 52

How do FHRPs differ from SSO?

A.

FHRPs provide gateway redundancy, and SSO provides failover within a single device

B.

FHRPs maintain state information within a single device, and SSO manages state information across multiple devices.

C.

FHRPs use OTV for redundancy, and SSO uses VXLAN for state synchronization.

D.

FHRPs influence bandwidth allocation, and SSO influences routing decisions.

Full Access
Question # 53

Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two.)

A.

custom headers

B.

authentication

C.

authorization

D.

request management

E.

accounting

Full Access
Question # 54

A wireless network engineer must configure a WPA2+WPA3 policy with the Personal security type. Which action meets this requirement?

A.

Configure the GCMP256 encryption cipher.

B.

Configure the CCMP128 encryption cipher.

C.

Configure the GCMP128 encryption cipher.

D.

Configure the CCMP256 encryption cipher.

Full Access
Question # 55

What is required for a VXLAN tunnel endpoint to operate?

A.

a VXLAN tunnel endpoint identifier

B.

at least one Layer 2 interface and one Layer 3 interlace

C.

at least one IP for the transit network and one IP for endpoint connectivity

D.

a VXLAN network identifier

Full Access
Question # 56

Why does the vBond orchestrator have a public IP?

Why does the vBond orchestrator have a public IP?

A.

to enable vBond to learn the public IP of WAN Edge devices that are behind NAT gateways or in private address space

B.

to facilitate downloading and distribution of operational and security patches

C.

to allow for global reachability from all WAN Edges in the Cisco SD-WAN and to facilitate NAT traversal

D.

to provide access to Cisco Smart Licensing servers for license enablement

Full Access
Question # 57

To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?

A.

security ft adaptive

B.

security wpa akm dotlx

C.

security wpa akm psk

D.

security wpa akm ft psk

Full Access
Question # 58

Which task Is mandatory when provisioning a device through the plug-and-play workflow in Cisco DNA Center?

A.

site assignment

B.

slack serial number assignment

C.

golden image upgrade

D.

template configuration application

Full Access
Question # 59

Which technique is used to protect end user devices and data from unknown file behavior?

A.

crypto file ransomware protection using a file hash calculation

B.

file retrospection using continuous scan and analyses

C.

phishing file quarantine using an internal environment to store attached files

D.

file sandboxing using a protected environment to analyze and simulate the behavior of unknown files

Full Access
Question # 60

An engineer must configure a new 6 Ghz only SSID on a cisco catalyst 9800 series WLC, with these requirements:

Provide 802.11ax data rates for supported devices

All users authenticate using a certificate

Which wireless layer 2 security mode meets the requirements?

A.

WPA2 Enterprise

B.

WPA3 Personal

C.

WPA2 Personal

D.

WPA3 Enterprise

Full Access
Question # 61

A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violates Which term refers to this REST security design principle?

A.

economy of mechanism

B.

complete mediation

C.

separation of privilege

D.

least common mechanism

Full Access
Question # 62

Whichtwo benefits result from a network design mat uses small and repeatable sections? (Choose two.)

A.

lower monitoring requirements

B.

low latency

C.

scalability

D.

quick failure isolation

E.

improved throughput

Full Access
Question # 63

Which new security enhancement is introduced by deploying a next-generation firewall at the data center in addition to the Internet edge?

A.

virtual private network for remote access

B.

DDoS protection

C.

firewall protection of the east-west traffic at the data center

D.

firewall protection of the south-north traffic at the data center

Full Access
Question # 64

What is a client who is running 802.1x for authentication reffered to as?

A.

supplicant

B.

NAC device

C.

authenticate

D.

policy enforcement point

Full Access
Question # 65

Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used

Full Access
Question # 66

Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used.

Full Access
Question # 67

What is a characteristic of a Type 2 hypervisor?

A.

quick deployment

B.

ideal for data center

C.

complicated deployment

D.

referred to as bare-metal

Full Access
Question # 68

An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?

A.

event manager applet ENABLE_OSPF_DEBUGevent syslog pattern "%OSPF-1-ADJCHG: Process 5. Nbr 1.1.1.1 on SerialO/0 from FULL to DOWN"action 1.0 cli command "debug ip ospf event"action 2.0 cli command "debug ip ospf adj"action 3.0 syslog priority informational msg "ENABLE_OSPF_DEBUG

B.

event manager applet ENABLEOSPFDEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 5, Nbr 1.1.1.1 on SerialO/0 from LOADING to FULL"action 1.0 cli command "debug ip ospf event"action 2.0 cli command "debug ip ospf adj"action 3.0 syslog priority informational msg "ENABLE JDSPF_DEBUG"

C.

event manager apple! ENABLE OSPFDEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 5. Nbr 1.1.1.1 on SerialO/0 from LOADING to FULL"action 1.0 cli command "enable"action 2.0 cli command "debug ip ospf event"action 3.0 cli command "debug ip ospf adj"action 4.0 syslog priority informational msg "ENABLE_OSPFJ} EBUG"

D.

event manager applet ENABLE_OSPF_DEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 6. Nbr 1.1.1.1 on SerialO/0 from FULL to DOWN"action 1.0 cli command "enable"action 2.0 cli command "debug ip ospf event"action 3.0 cli command "debug ip ospf adj"action 4.0 syslog priority informational msg "ENABLE_OSPF_DEBUG'*

Full Access
Question # 69

What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?

A.

It facilitates software upgrades to network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It uses a predefined configuration through parameterized elements or variables.

D.

It provides a high-level overview of the health of every network device.

Full Access
Question # 70

Drag and drop the snippets onto the blanks within the code to create an EEM script that adds an entry to a locally stored text file with a timestamp when a configuration change is made. Not all options are used.

Full Access
Question # 71

An engineer must configure a new WLAN that supports 802.11r and requires users to enter a passphrase. What must be configured to support this requirement?

A.

802.1XandSUITEB-1X

B.

FT PSK and Fast Transition

C.

802.1X and Fast Transition

D.

FTPSKandSUITEB-1X

Full Access
Question # 72

Refer to the exhibit.

An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?

A)

B)

C)

D)

Full Access
Question # 73

What is a Type 1 hypervisor?

A.

runs directly on a physical server and depends on a previously installed operating system

B.

runs directly on a physical server and includes its own operating system

C.

runs on a virtual server and depends on an already installed operating system

D.

run on a virtual server and includes its own operating system.

Full Access
Question # 74

What is the responsibility of a secondary WLC?

A.

It avoids congestion on the primary controller by sharing the registration load on the LAPs.

B.

It registers the LAPs if the primary controller fails.

C.

It enables Layer 2 and Layer 3 roaming between itself and the primary controller.

D.

It shares the traffic load of the LAPs with the primary controller

Full Access
Question # 75

What is one main REST security design principle?

A.

separation of privilege

B.

password hashing

C.

confidential algorithms

D.

OAuth

Full Access
Question # 76

Which action controls the maximum cell size in a high-density wireless environment?

A.

Statically set TX power on access points to max.

B.

Disable low data rates.

C.

Set mandatory data rates.

D.

Decrease TX power on access points.

Full Access
Question # 77

What is the VXLAN network identifier used to identify?

A.

network tunnel interface

B.

IP subnet

C.

virtual tunnel endpoint

D.

broadcast domain

Full Access
Question # 78

What is the purpose of a data modeling language?

A.

to establish a framework to process data by using an object-oriented programming approach

B.

to specify the rules for transcoding between text and binary data encodings

C.

to standardize the procedures that are executed when parsing sent and received data

D.

to describe the structure and meaning of exchanged data

Full Access
Question # 79

Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity?

A.

802. 1d

B.

802.1x

C.

802.1q

D.

802.1w

Full Access
Question # 80

Which characteristic applies to the endpoint security aspect of the Cisco Threat Defense architecture?

A.

detect and block ransomware in email attachments

B.

cloud-based analysis of threats

C.

outbound URL analysis and data transfer controls

D.

user context analysis

Full Access
Question # 81

Refer to the exhibit. Based on this JSON response:

Which Python statement parses the response and prints "10:42:36.111 UTC Mon Jan 1 2024"?

A.

printfresponset[jsonrpc'][‘body’]['simple_time'])

B.

print(response[result'][0][,simple_time,])

C.

printfresponsefresult'Jfbody'JfsimpleJime'])

D.

printfresponsel'body'jrsimplejime'])

Full Access
Question # 82

Refer to the exhibit.

A client requests a new SSID that will use web-based authentication and external RADIUS servers. Which Layer 2 security mode must be selected?

A.

Static WEP

B.

WPA2 + WPA3

C.

None

D.

WPA + WPA2

Full Access
Question # 83

Full Access
Question # 84

Full Access
Question # 85

Full Access
Question # 86

Full Access