Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Enterprise > 350-401

350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Question and Answers

Question # 4

Full Access
Question # 5

Full Access
Question # 6

Full Access
Question # 7

Full Access
Question # 8

Full Access
Question # 9

Full Access
Question # 10

Full Access
Question # 11

Full Access
Question # 12

Full Access
Question # 13

Full Access
Question # 14

Refer to the exhibit. An engineer must adjust the configuration so that Router A becomes the active router. Which commands should be applied to router A? (Choose two)

A.

vrrp 1 priority 90

B.

vrrp 1 timers advertise 1

C.

vrrp lip 10.1.0.11

D.

ip address 10.1.0.11 255.0.0.0

E.

vrrp 1 priority 120

Full Access
Question # 15

What is the purpose of a data modeling language?

A.

to establish a framework to process data by using an object-oriented programming approach

B.

to specify the rules for transcoding between text and binary data encodings

C.

to standardize the procedures that are executed when parsing sent and received data

D.

to describe the structure and meaning of exchanged data

Full Access
Question # 16

What are two characteristics of a directional antenna? (Choose two.)

A.

high gain

B.

receive signals equally from all directions

C.

commonly used to cover large areas

D.

provides the most focused and narrow beam width

E.

low gain

Full Access
Question # 17

Which method displays text directly into the active console with a synchronous EEM applet policy?

A.

event manager applet boom

event syslog pattern 'UP'

action 1.0 gets 'logging directly to console'

B.

event manager applet boom

event syslog pattern 'UP'

action 1.0 syslog priority direct msg 'log directly to console'

C.

event manager applet boom

event syslog pattern 'UP'

action 1.0 puts 'logging directly to console'

D.

event manager applet boom

event syslog pattern 'UP'

action 1.0 string 'logging directly to console'

Full Access
Question # 18

What is one benefit of adopting a data modeling language?

A.

deploying machine-friendly codes to manage a high number of devices

B.

augmenting the use of management protocols like SNMP for status subscriptions

C.

augmenting management process using vendor centric actions around models

D.

refactoring vendor and platform specific configurations with widely compatible configurations

Full Access
Question # 19

What is a characteristic of VXLAN?

A.

It extends Layers 2 and Layer 3 overlay network over a Layer 2 underly.

B.

It has a 12-byte packet header.

C.

Its frame encapsulation is performed by MAC-in-UDP.

D.

It uses TCP for transport

Full Access
Question # 20

Which solution supports end-to-end line-rate encryption between two sites?

A.

TrustSec

B.

MACsec

C.

IPsec

D.

GRE

Full Access
Question # 21

Drag and drop the automation characteristics from the left onto the corresponding tools on the right. Not all options are used.

Full Access
Question # 22

Which two Cisco SD-Access components provide communication between traditional network elements and the controller layer? (Choose two.)

A.

network underlay

B.

network control platform

C.

network data platform

D.

partner ecosystem

E.

fabric overlay

Full Access
Question # 23

Which language defines the structure or modelling of data for NETCONF and RESTCONF?

A.

JSON

B.

YANG

C.

XML

D.

YAML

Full Access
Question # 24

What is the primary responsibility of the vBond orchestrator?

A.

to provide centralized management and provisioning of all elements into the network

B.

to configure NAT communication on WAN Edge routers

C.

to provide configuration synchronization of an WAN Edge devices

D.

to facilitate start-up by performing authentication and authorization of all elements into the network

Full Access
Question # 25

Which deployment option of Cisco NGFW provides scalability?

A.

tap

B.

inline tap

C.

high availability

D.

clustering

Full Access
Question # 26

An engineer must construct an access list for a Cisco Catalyst 9800 Series WLC that will redirect wireless guest users to a splash page that is hosted on a Cisco ISE server. The Cisco ISE servers are hosted at 10.9.11.141 and 10.1.11.141. Which access list meets the requirements?

A.

B.

C.

D.

Full Access
Question # 27

Why are stateless calls executed by REST API useful in cloud applications?

A.

They use HTTPS to implement all calls.

B.

They control URL decoding.

C.

They are easy to redeploy and to scale.

D.

They rely on data stored on the server for calls.

Full Access
Question # 28

What is one method for achieving REST API security?

A.

using a MD5 hash to verify the integrity

B.

using built-in protocols known as Web Services Security

C.

using HTTPS and TLS encryption

D.

using a combination of XML encryption and XML signatures

Full Access
Question # 29

An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?

A.

EAP-TLS

B.

EAP-FAST

C.

LDAP

D.

PEAP

Full Access
Question # 30

What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?

A.

It facilitates software upgrades to network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It uses a predefined configuration through parameterized elements or variables.

D.

It provides a high-level overview of the health of every network device.

Full Access
Question # 31

Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.

A.

action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file"

B.

action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file"

C.

action 4.0 ens-event "show process cpu sorted | append flash:high-cpu-file"

D.

action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file"

Full Access
Question # 32

To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?

A.

security ft adaptive

B.

security wpa akm dotlx

C.

security wpa akm psk

D.

security wpa akm ft psk

Full Access
Question # 33

What does the statement print(format(0.8, \0%')) display?

A.

80%

B.

8.8%

C.

.08%

D.

8%

Full Access
Question # 34

What is the measure of the difference between the received signal and the noise floor in a wireless environment?

A.

XOR

B.

RSSI

C.

RRM

D.

SNR

Full Access
Question # 35

Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used.

Full Access
Question # 36

What is a characteristic of omnidirectional antennas?

A.

It includes dish antennas.

B.

It has high gain.

C.

It provides the most focused and narrow beamwidth.

D.

It includes dipole antennas.

Full Access
Question # 37

What are two device roles in the Cisco SD-Access fabric? (Choose two.)

A.

access switch

B.

vBond controller

C.

edge node

D.

core switch

E.

border node

Full Access
Question # 38

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

A.

RSSI

B.

SNR

C.

Noise

D.

CCI

Full Access
Question # 39

What is the intent API in Cisco Catalyst Center (formerly DNA Center)?

A.

northbound consumer-facing RESTful API, which enables network discovery and configuration management

B.

southbound consumer-facing RESTful API. which enables network discovery and configuration management

C.

interface between the controller and the network devices, which enables network discovery and configuration management

D.

westbound interface, which allows the exchange of data such as ITSM. IPAM, and reporting information

Full Access
Question # 40

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

A.

Cisco Firepower and FireSIGHT

B.

Cisco Stealth watch system

C.

Advanced Malware Protection

D.

Cisco Web Security Appliance

Full Access
Question # 41

Which message type is valid for IGMPv3?

A.

leave group

B.

hello

C.

graft

D.

source-specific membership report

Full Access
Question # 42

Which two pieces of information are necessary to compute SNR? (Choose two.)

A.

EIRP

B.

noise floor

C.

antenna gain

D.

RSSI

E.

transmit power

Full Access
Question # 43

What is the function of an intermediate node in a Cisco SD-Access fabric?

A.

to route packets within the fabric based on the Layer 3 information in the header

B.

to provide an entry and exit point between the fabric and external resources

C.

to encapsulate and de-encapsulate packets with a VXLAN header

D.

to provide reachability between fabric clients and nonfabric clients on the same subnet

Full Access
Question # 44

A response code of 404 is received while using the REST API on Cisco UNA Center to POST to this URI.

/dna/intent/api/v1 /template-programmer/project

What does the code mean?

A.

The client made a request a resource that does not exist.

B.

The server has not implemented the functionality that is needed to fulfill the request.

C.

The request accepted for processing, but the processing was not completed.

D.

The POST/PUT request was fulfilled and a new resource was created, Information about the resource is in the response body.

Full Access
Question # 45

Which feature provides data-plane security for Cisco Catalyst SD-WAN networks'?

A.

IPsec

B.

SSH

C.

IPS

D.

TLS/DTLS

Full Access
Question # 46

Reler to the exhibit. An engineer configuring WebAuth on a Cisco Catalyst 9000 Series WIC. The engineer has purchased a third-party certificate using the FQDN of the WLC as the CN and intends to use bit on the WebAuth splash page What must be configured so that the clients do not receive a certificate error?

A.

Virtual IPv4 Address must be set to a routable address.

B.

Virtual IPv4 Hostname must match the CN of the certificate.

C.

Trustpoint must be set to the management certificate of the WLC.

D.

Web Auth Intercept HTTPs must be enabled.

Full Access
Question # 47

In a virtual environment, what is a VMDK file?

A.

A file containing information about snapshots of a virtual machine.

B.

A zip file connecting a virtual machine configuration file and a virtual disk.

C.

A configuration file containing settings for a virtual machine such as a guest OS.

D.

A file containing a virtual machine disk drive.

Full Access
Question # 48

What is the function of the statement "import actions" in this script?

A.

It imports the functions that are not available natively in Python

B.

It imports the functions of a third-party module

C.

It imports a Python module

D.

It imports an external reference

Full Access
Question # 49

What is required for a VXLAN tunnel endpoint to operate?

A.

a VXLAN tunnel endpoint identifier

B.

at least one Layer 2 interface and one Layer 3 interlace

C.

at least one IP for the transit network and one IP for endpoint connectivity

D.

a VXLAN network identifier

Full Access
Question # 50

Refer to the exhibit An engineer is troubleshooting an issue with non-Wi-Fi interference on the 5-GHz band The engineer has enabled Cisco CleanAir and set the appropriate traps, but the AP does not change the channel when it detects significant interference Which action will resolve the issue?

A.

Enable the Avoid Persistent Non-WiFi Interference option

B.

Disable the Avoid Foreign AP Interference option.

C.

Change the DCA Sensitivity option to High

D.

Enable the Event Driven Radio Resource Management option

Full Access
Question # 51

Which language defines the structure or modeling of data for NETCONF and RESTCONF?

A.

YAML

B.

YANG

C.

JSON

D.

XML

Full Access
Question # 52

Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors?

A.

Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes.

B.

Each virtual machine requires a unique IP address but shares the MAC address with the physical server

C.

Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server.

D.

Each virtual machine requires a unique MAC address but shares the IP address with the physical server.

Full Access
Question # 53

Which First Hop Redundancy Protocol should be used to meet a design requirements for more efficient default bandwidth usage across multiple devices?

A.

GLBP

B.

LCAP

C.

HSRP

D.

VRRP

Full Access
Question # 54

What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?

A.

real-time threat management to stop DDoS attacks to the core and access networks

B.

malware control

C.

real-time awareness of users, devices, and traffic on the network

D.

dynamic threat control for web traffic 

Full Access
Question # 55

What is a characteristic of VRRP?

A.

It inherently balances load amongst the available gateways.

B.

It ensures symmetric traffic flow upstream and downstream.

C.

It Is a Cisco proprietary protocol.

D.

It uses a virtual IP address and a virtual MAC address to achieve redundancy

Full Access
Question # 56

Which feature is needed to maintain the IP address of a client when an inter-controller Layer 3 roam is performed between two WLCs that are using different mobility groups?

A.

interface groups

B.

RF groups

C.

AAA override

D.

auto anchor

Full Access
Question # 57

Which technology collects location information through data packets received by the APs instead of using mobile device probes?

A.

detect and locate

B.

FastLocate

C.

hyperlocation

D.

RF fingerprinting

Full Access
Question # 58

An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement?

A.

RF

B.

WLAN

C.

Policy

D.

Flex

Full Access
Question # 59

Which tag defines the properties to be applied to each specific WLAN?

A.

RF tag

B.

policy tag

C.

AP tag

D.

site tag

Full Access
Question # 60

When does a Cisco StackWise primary switch lose its role?

A.

when a stack member fails

B.

when the stack primary is reset

C.

when a switch with a higher priority is added to the stack

D.

when the priority value of a stack member is changed to a higher value

Full Access
Question # 61

Which method requires a client to authenticate and has the capability to function without encryption?

A.

open

B.

WEP

C.

WebAuth

D.

PSK

Full Access
Question # 62

Why would a network engineer configure an AP in SE-Connect mode?

A.

to redirect WLAN traffic to an endpoint for protocol analysis

B.

to monitor the VLAN traffic for rogue APs

C.

to connect the wired LAN with the wireless infrastructure

D.

to analyze the RF spectrum surrounding the AP

Full Access
Question # 63

Which AP mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?

A.

SE-connect mode

B.

sensor mode

C.

client mode

D.

sniffer mode

Full Access
Question # 64

Full Access
Question # 65

Full Access
Question # 66

Full Access
Question # 67

Full Access
Question # 68

Full Access
Question # 69

Full Access
Question # 70

Full Access
Question # 71

Full Access
Question # 72

Full Access
Question # 73

Full Access
Question # 74

Full Access
Question # 75

Full Access
Question # 76

Full Access
Question # 77

Full Access
Question # 78

Full Access
Question # 79

OR

Full Access