March Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Questions 4

Refer io me exhibit.

350-401 Question 4

An engineer configures the trunk and proceeds to configure an ESPAN session to monitor VLANs10. 20. and 30. Which command must be added to complete this configuration?

Options:

A.

Device(config.mon.erspan.stc)# no filter vlan 30

B.

Devic(config.mon.erspan.src-dst)# no vrf 1

C.

Devic(config.mon.erspan.src-dst)# erspan id 6

D.

Device(config.mon-erspan.Src-dst)# mtu 1460

Buy Now
Questions 5

What is the recommended minimum SNR for data applications on wireless networks?

Options:

A.

15

B.

20

C.

25

D.

10

Buy Now
Questions 6

Which benefit is provided by the Cisco DNA Center telemetry feature?

Options:

A.

provides improved network security

B.

inventories network devices

C.

aids In the deployment network configurations

D.

improves the user experience

Buy Now
Questions 7

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?

Options:

A.

EIRP

B.

mW

C.

dBm

D.

dBi

Buy Now
Questions 8

If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm, which power level effectively doubles the transmit power?

Options:

A.

13dBm

B.

14 dBm

C.

17dBm

D.

20 dBm

Buy Now
Questions 9

Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (choose two)

Options:

A.

network data platform

B.

network underlay

C.

fabric overlay

D.

network control platform

E.

partner ecosystem

Buy Now
Questions 10

Which three resources must the hypervisor make available to the virtual machines? (Choose three)

Options:

A.

memory

B.

bandwidth

C.

IP address

D.

processor

E.

storage

F.

secure access

Buy Now
Questions 11

What are the main components of Cisco TrustSec?

Options:

A.

Cisco ISE and Enterprise Directory Services

B.

Cisco ISE. network switches, firewalls, and routers

C.

Cisco ISE and TACACS+

D.

Cisco ASA and Cisco Firepower Threat Defense

Buy Now
Questions 12

Refer to the exhibit.

350-401 Question 12

A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?

Options:

A.

aaa authentication login default group ISE-Servers local enable

B.

aaa authentication login default group enable local ISE-Servers

C.

aaa authorization exec default group ISE-Servers local enable

D.

aaa authentication login error-enable

aaa authentication login default group enable local ISE-Servers

Buy Now
Questions 13

Refer to the exhibit.

350-401 Question 13

What is the effect of these commands on the BR and HQ tunnel interfaces?

350-401 Question 13

Options:

A.

The tunnel line protocol goes down when the keepalive counter reaches 6

B.

The keepalives are sent every 5 seconds and 3 retries

C.

The keepalives are sent every 3 seconds and 5 retries

D.

The tunnel line protocol goes down when the keepalive counter reaches 5

Buy Now
Questions 14

Which benefit is realized by implementing SSO?

Options:

A.

IP first-hop redundancy

B.

communication between different nodes for cluster setup

C.

physical link redundancy

D.

minimal network downtime following an RP switchover

Buy Now
Questions 15

350-401 Question 15

Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?

Options:

A.

print(response['resut'][0||'simple_time']}

B.

print(response[result']['body']['simple_time']}

C.

print(response['body']['simple_time']}

D.

print(response[jresult']['body']['simple_time']}

Buy Now
Questions 16

What does the number in an NTP stratum level represent?

Options:

A.

The number of hops it takes to reach the master time server.

B.

The number of hops it takes to reach the authoritative time source.

C.

The amount of offset between the device clock and true time.

D.

The amount of drift between the device clock and true time.

Buy Now
Questions 17

Refer to the exhibit.

350-401 Question 17

R1 is able to ping the R3 fa0/1 Interface. Why do the extended pings fail?

Options:

A.

The DF bit has been set

B.

The maximum packet size accepted by the command is 147G bytes

C.

R2 and R3 do not have an OSPF adjacency

D.

R3 is missing a return route to 10.99.69.0/30

Buy Now
Questions 18

what is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?

Options:

A.

better application performance

B.

Improved security because the underlying OS is eliminated

C.

Improved density and scalability

D.

ability to operate on hardware that is running other OSs

Buy Now
Questions 19

Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)

Options:

A.

NFS share

B.

non-linux server

C.

local server

D.

remote server

E.

bare metal server

Buy Now
Questions 20

Refer to the exhibit.

350-401 Question 20

What is the result of the API request?

Options:

A.

The "params" variable sends data fields to the network appliance.

B.

The native interface information is read from the network appliance.

C.

The Information for all interfaces is read from the network appliance.

D.

The "params" variable reads data fields from the network appliance

Buy Now
Questions 21

Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?

Options:

A.

Option 42

B.

Option 15

C.

Option 125

D.

Option 43

Buy Now
Questions 22

Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?

Options:

A.

Authentication Down/Switching Down

B.

Authentication-Central/Switch-Local

C.

Authentication- Down/Switch-Local

D.

Authentication-Central/Switch-Central

Buy Now
Questions 23

A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)

Options:

A.

distribute-list prefix OFFICE in under the OSPF process

B.

Ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 Ie 32

C.

ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 ge 32

D.

distribute-list OFFICE out under the OSPF process

E.

distribute-list OFFICE in under the OSPF process

Buy Now
Questions 24

How do EIGRP metrics compare to OSPF metrics?

Options:

A.

EIGRP metrics are based on a combination of bandwidth and packet loss, and OSPF metrics are based on interface bandwidth.

B.

EIGRP uses the Dijkstra algorithm, and OSPF uses The DUAL algorithm

C.

The EIGRP administrative distance for external routes is 170. and the OSPF administrative distance for external routes is undefined

D.

The EIGRP administrative distance for external routes is 170. and the OSPF administrative distance for external routes is 110

Buy Now
Questions 25

Reter to the exhibit.

350-401 Question 25

An administrator troubleshoots intermittent connectivity from internal hosts to an external public server. Some internal hosts can connect to the server while others receive an ICMP Host Unreachable message and these hosts change over time. What is the cause of this issue?

Options:

A.

The translator does not use aOdress overloading

B.

The NAT ACL does not match alt internal hosts

C.

The NAT ACL and NAT pool share the same name

D.

The NAT pool netmask rs excessively wide

Buy Now
Questions 26

How does NETCONF YANG represent data structures?

Options:

A.

as strict data structures denned by RFC 6020

B.

in an XML tree format

C.

in an HTML format

D.

as modules within a tree

Buy Now
Questions 27

What Is a characteristic of a WLC that is in master controller mode?

Options:

A.

All wireless LAN controllers are managed by the master controller.

B.

All new APs that join the WLAN are assigned to the master controller.

C.

Configuration on the master controller is executed on all wireless LAN controllers.

D.

The master controller is responsible for load balancing all connecting clients to other controllers

Buy Now
Questions 28

350-401 Question 28

350-401 Question 28

Refer to the exhibit. Which configuration must be implemented to establish EBGP peering between R1 and R2?

350-401 Question 28

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 29

Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?

Options:

A.

manages fabric-enabled APs and forwards client registration and roaming information to the Control Plane Node

B.

coordinates configuration of autonomous nonfabric access points within the fabric

C.

performs the assurance engine role for both wired and wireless clients

D.

is dedicated to onboard clients in fabric-enabled and nonfabric-enabled APs within the fabric

Buy Now
Questions 30

Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right.

350-401 Question 30

Options:

Buy Now
Questions 31

350-401 Question 31

Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected is switch2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two)

350-401 Question 31

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 32

Refer to the exhibit.

350-401 Question 32

An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?

A)

350-401 Question 32

B)

350-401 Question 32

C)

350-401 Question 32

D)

350-401 Question 32

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 33

Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.

350-401 Question 33

Options:

Buy Now
Questions 34

350-401 Question 34

Refer to the exhibit. Which result does the python code achieve?

Options:

A.

The code encrypts a base64 decrypted password.

B.

The code converts time to the "year/month/day" time format.

C.

The code converts time to the yyyymmdd representation.

D.

The code converts time to the Epoch LINUX time format.

Buy Now
Questions 35

An engineer must configure AAA on a Cisco 9800 WLC for central web authentication Which two commands are needed to accomplish this task? (Choose two.)

350-401 Question 35

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 36

Drag and drop the snippets onto the blanks within the code to construct a script that configures BGP according to the topology. Not all options are used, and some options may be used twice.

350-401 Question 36

Options:

Buy Now
Questions 37

A network engineer is enabling HTTPS access to the core switch, which requires a certificate to be installed on the switch signed by the corporate certificate authority Which configuration commands are required to issue a certificate signing request from the core switch?

A)

350-401 Question 37

B)

350-401 Question 37

C)

350-401 Question 37

D)

350-401 Question 37

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 38

Refer to the exhibit.

350-401 Question 38

Which Python code snippet prints the descriptions of disabled interfaces only?

A)

350-401 Question 38

B)

350-401 Question 38

C)

350-401 Question 38

D)

350-401 Question 38

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 39

What does a northbound API accomplish?

Options:

A.

programmatic control of abstracted network resources through a centralized controller

B.

access to controlled network resources from a centralized node

C.

communication between SDN controllers and physical switches

D.

controlled access to switches from automated security applications

Buy Now
Questions 40

Drag and drop the snippets onto the blanks within the code to construct a script that advertises the network prefix 192.168.5.0/24 into a BGP session. Not all options are used

350-401 Question 40

Options:

Buy Now
Questions 41

Why would a log file contain a * next to the date?

Options:

A.

The network device was receiving NTP time when the log messages were recorded.

B.

The network device was unable to reach The NTP server when the log messages were recorded

C.

The network device is not configured to use NTP.

D.

The network device is nor configured to use NTP time stamps for logging

Buy Now
Questions 42

When is the Design workflow used In Cisco DNA Center?

Options:

A.

in a greenfield deployment, with no existing infrastructure

B.

in a greenfield or brownfield deployment, to wipe out existing data

C.

in a brownfield deployment, to modify configuration of existing devices in the network

D.

in a brownfield deployment, to provision and onboard new network devices

Buy Now
Questions 43

An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface. Which option also is required on the tunnel interface before it is operational?

Options:

A.

(config-if)#tunnel destination

B.

(config-if)#keepalive

C.

(config-if)#ip mtu

D.

(config-if)#ip tcp adjust-mss

Buy Now
Questions 44

Drag and drop the characteristics from the left onto the infrastructure deployment models they describe on the right.

350-401 Question 44

Options:

Buy Now
Questions 45

If a client's radio device receives a signal strength of -67 dBm and the noise floor is -85 dBm, what is the SNR value?

Options:

A.

15 dB

B.

16 dB

C.

18 dB

D.

20 dB

Buy Now
Questions 46

Which Python code snippet must be added to the script to save the returned configuration as a JSON-formatted file?

350-401 Question 46

A)

350-401 Question 46

B)

350-401 Question 46

C)

350-401 Question 46

D)

350-401 Question 46

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 47

Drag and drop the characteristics from the left onto the routing protocols they describe on the right

350-401 Question 47

Options:

Buy Now
Questions 48

Drag and drop the descriptions from the left onto the routing protocol they describe on the right.

350-401 Question 48

Options:

Buy Now
Questions 49

An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail Which configuration should be applied?

Options:

A.

aaa authentication login CONSOLE group radius local-case enable aaa

B.

authentication login CONSOLE group radius local enable none

C.

aaa authentication login CONSOLE group radius local enable

D.

aaa authentication login CONSOLE group tacacs+ local enable

Buy Now
Questions 50

A network engineer is adding an additional 10Gps link to an exiting 2x10Gps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be taken out of service if one of its member links goes down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

350-401 Question 50

Options:

Buy Now
Questions 51

What is a benefit of Type 1 hypervisors?

Options:

A.

Administrators are able to load portable virtual machine packages in OVA or QCOW2 formats.

B.

Network engineers are able to create virtual networks o interconnect virtual machines in Layer 2 topologies

C.

Operators are able to leverage orchestrators to manage workloads that run on multiple Type 1 hypervisors

D.

Storage engineers are able to leverage VMDK files to provide storage to virtual machine.

Buy Now
Questions 52

Refer to the exhibit.

350-401 Question 52

An engineers reaching network 172 16 10 0/24 via the R1-R2-R4 path. Which configuration forces the traffic to take a path of R1-R3-R4?

A)

350-401 Question 52

B)

350-401 Question 52

C)

350-401 Question 52

D)

350-401 Question 52

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 53

What is the responsibility of a secondary WLC?

Options:

A.

It shares the traffic load of the LAPs with the primary controller.

B.

It avoids congestion on the primary controller by sharing the registration load on the LAPs.

C.

It registers the LAPs if the primary controller fails.

D.

It enables Layer 2 and Layer 3 roaming between Itself and the primary controller.

Buy Now
Questions 54

An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command set is required to complete this task?

350-401 Question 54

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 55

Refer to the exhibit.

350-401 Question 55

After running the code in the exhibit. Which step reduces the amount of data that NETCONF server returns to the NETCONF client, to only the interface’s configuration?

Options:

A.

Create an XML filter as a string and pass it to get_config() method as an argument

B.

Use the txml library to parse the data returned by the NETCONF server for the interface’s configuration

C.

Create a JSON filter as a string and pass it to the get_config() method as an argument

D.

Use the JSON library to parse the data returned by the NETCONF server for the interface’s configuration

Buy Now
Questions 56

Drag anti drop the characteristics from the ten onto the configuration models on the right.

350-401 Question 56

Options:

Buy Now
Questions 57

Refer the exhibit.

350-401 Question 57

Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?

A)

350-401 Question 57

B)

350-401 Question 57

C)

350-401 Question 57

D)

350-401 Question 57

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 58

350-401 Question 58

Refer to the exhibit. An engineer tries to log in to router R1. Which configuration enables a successful login?

A)

350-401 Question 58

B)

350-401 Question 58

C)

350-401 Question 58

D)

350-401 Question 58

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 59

Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

350-401 Question 59

Options:

Buy Now
Questions 60

What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?

Options:

A.

SSH

B.

HTTPS

C.

JWT

D.

TLS

Buy Now
Questions 61

Which resource is able to be shared among virtual machines deployed on the same physical server?

Options:

A.

applications

B.

disk

C.

VM configuration file

D.

operating system

Buy Now
Questions 62

Which IPv4 packet field carries the QoS IP classification marking?

Options:

A.

ID

B.

TTL

C.

FCS

D.

ToS

Buy Now
Questions 63

Refer to the exhibit.

350-401 Question 63

Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?

A)

350-401 Question 63

B)

350-401 Question 63

C)

350-401 Question 63

D)

350-401 Question 63

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 64

Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?

Options:

A.

mobility

B.

LWAPP

C.

CAPWAP

D.

iPsec

Buy Now
Questions 65

Refer to the exhibit.

350-401 Question 65

What are two effect of this configuration? (Choose two.)

Options:

A.

Inside source addresses are translated to the 209.165.201.0/27 subnet.

B.

It establishes a one-to-one NAT translation.

C.

The 10.1.1.0/27 subnet is assigned as the inside global address range.

D.

The 209.165.201.0/27 subnet is assigned as the outside local address range.

E.

The 10.1.1.0/27 subnet is assigned as the inside local addresses.

Buy Now
Questions 66

Options:

A.

S2 is configured as LACP. Change the channel group mode to passive

B.

S2 is configured with PAgP. Change the channel group mode to active.

C.

S1 is configured with LACP. Change the channel group mode to on

D.

S1 is configured as PAgP. Change the channel group mode to desirable

Buy Now
Questions 67

Drag and drop the characteristics from the left to the table types on the right.

350-401 Question 67

Options:

Buy Now
Questions 68

Drag and drop the characteristics from the left onto the deployment types on the right.

350-401 Question 68

Options:

Buy Now
Questions 69

350-401 Question 69

Refer to the exhibit. Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?

350-401 Question 69

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 70

An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, WHICH VIRTUAL IP address must be used in this configuration?

Options:

A.

192.0.2.1

B.

172.20.10.1

C.

1.1.1.1

D.

192.168.0.1

Buy Now
Questions 71

350-401 Question 71

Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?

350-401 Question 71

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 72

A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?

Options:

A.

economy of mechanism

B.

complete mediation

C.

separation of privilege

D.

least common mechanism

Buy Now
Questions 73

How must network management traffic be treated when defining QoS policies?

Options:

A.

as delay-sensitive traffic in a low latency queue

B.

using minimal bandwidth guarantee

C.

using the same marking as IP routing

D.

as best effort

Buy Now
Questions 74

Drag and drop characteristics of PIM dense mode from the left to the right.

350-401 Question 74

Options:

Buy Now
Questions 75

Which antenna type should be used for a site-to-site wireless connection?

Options:

A.

Omnidirectional

B.

dipole

C.

patch

D.

Yagi

Buy Now
Questions 76

Which two parameters are examples of a QoS traffic descriptor? (Choose two)

Options:

A.

MPLS EXP bits

B.

bandwidth

C.

DSCP

D.

ToS

E.

packet size

Buy Now
Questions 77

350-401 Question 77

Refer to the exhibit. Router BRDR-1 is configured to receive the 0.0.0.0/0 and 172.17.1.0/24 network via BGP and advertise them into OSPF are 0. An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and default route 0.0.0.0/0 is still missing. Which configurating must engineer apply to resolve the problem?

350-401 Question 77

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 78

What is required for intercontroller Layer 3 roaming?

Options:

A.

Mobility groups are established between wireless controllers.

B.

The management VLAN is present as a dynamic VLAN on the second WLC.

C.

WLCs use separate DHCP servers.

D.

WLCs have the same IP addresses configured on their interfaces.

Buy Now
Questions 79

Which technology is used as the basis for the cisco sd-access data plane?

Options:

A.

IPsec

B.

LISP

C.

VXLAN

D.

802.1Q

Buy Now
Questions 80

By default, which virtual MAC address does HSRP group 16 use?

Options:

A.

c0:41:43:64:13:10

B.

00:00:0c 07:ac:10

C.

00:05:5c:07:0c:16

D.

05:00:0c:07:ac:16

Buy Now
Questions 81

What is the wireless received signal strength indicator?

Options:

A.

The value given to the strength of the wireless signal received compared to the noise level

B.

The value of how strong the wireless signal Is leaving the antenna using transmit power, cable loss, and antenna gain

C.

The value of how much wireless signal is lost over a defined amount of distance

D.

The value of how strong a tireless signal is receded, measured in dBm

Buy Now
Questions 82

What is one primary REST security design principle?

Options:

A.

fail-safe defaults

B.

password hash

C.

adding a timestamp in requests

D.

OAuth

Buy Now
Questions 83

An engineer is working with the Cisco DNA Center API Drag and drop the methods from the left onto the actions that they are used for on the right.

350-401 Question 83

Options:

Buy Now
Questions 84

Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic?

Options:

A.

bridge domain

B.

VLAN

C.

VRF

D.

VNI

Buy Now
Questions 85

Refer to the exhibit.

350-401 Question 85

After configuring HSRP an engineer enters the show standby command. Which two facts are derived from the output? (Choose two.)

Options:

A.

The router with IP 10.10 1.3 is active because it has a higher IP address

B.

If Fa0/0 is shut down, the HSRP priority on R2 becomes 80

C.

R2 Fa1/0 regains the primary role when the link comes back up

D.

R2 becomes the active router after the hold time expires.

E.

R2 is using the default HSRP hello and hold timers.

Buy Now
Questions 86

Refer to the exhibit.

350-401 Question 86

An engineer must create a configuration that prevents R3from receiving the LSA about 172.16.1.4/32.Which configuration set achieves this goal?

350-401 Question 86

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 87

What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?

Options:

A.

The traffic uses the default MDT to transmit the data only if it isa (S,G) multicast route entry

B.

A data MDT is created to if it is a (*, G) multicast route entries

C.

A data and default MDT are created to flood the multicast stream out of all PIM-SM neighbors.

D.

A data MDT is created to allow for the best transmission through the core for (S, G) multicast route entries.

Buy Now
Questions 88

A vulnerability assessment highlighted that remote access to the switches is permitted using unsecure and unencrypted protocols Which configuration must be applied to allow only secure and reliable remote access for device administration?

Options:

A.

line vty 0 15

login local

transport input none

B.

line vty 0 15

login local

transport input telnet ssh

C.

line vty 0 15

login local

transport input ssh

D.

line vty 0 15

login local

transport input all

Buy Now
Questions 89

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?

Options:

A.

ISE server

B.

local WLC

C.

RADIUS server

D.

anchor WLC

Buy Now
Questions 90

Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session?

Options:

A.

HTTP Status Code 200

B.

HTTP Status Code 302

C.

HTTP Status Code 401

D.

HTTP Status Code: 504

Buy Now
Questions 91

When are multicast RPs required?

Options:

A.

RPs are required only when using protocol independent multicast dense mode.

B.

By default, the RP is needed penodically to maintain sessions with sources and receivers.

C.

RPs are required for protocol Independent multicast sparse mode and dense mode.

D.

By default, the RP Is needed only start new sessions with sources and receivers.

Buy Now
Questions 92

Refer to the exhibit.

350-401 Question 92

An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added?

Options:

A.

under the interface

B.

under the flow record

C.

under the flow monitor

D.

under the flow exporter

Buy Now
Questions 93

Refer to the exhibit:

350-401 Question 93

An engineer configures VRRP and issues the show commands to verify operation. What does the engineer confirm about VRRP group 1 from the output?

Options:

A.

There is no route to 10.10.1.1/32 in R2’s routing table

B.

If R1 reboots, R2 becomes the master virtual router until R2 reboots

C.

Communication between VRRP members is encrypted using MD5

D.

R1 is primary if 10.10.1.1/32 is in its routing table

Buy Now
Questions 94

How does CEF switching differ from process switching on Cisco devices?

Options:

A.

CEF switching saves memory by sorting adjacency tables in dedicate memory on the line cards, and process switching stores all tables in the main memory

B.

CEF switching uses adjacency tables built by the CDP protocol, and process switching uses the routing table

C.

CEF switching uses dedicated hardware processors, and process switching uses the main processor

D.

CEF switching uses proprietary protocol based on IS-IS for MAC address lookup, and process switching uses in MAC address table

Buy Now
Questions 95

Refer to the exhibit.

350-401 Question 95

Which IP address becomes the active next hop for 192.168.102 0/24 when 192.168.101.2 fails?

Options:

A.

192.168.101.18

B.

192.168.101.6

C.

192.168.101.10

D.

192.168.101.14

Buy Now
Questions 96

In which two ways does TCAM differ from CAM? (Choose two.)

Options:

A.

CAM is used to make Layer 2 forwarding decisions, and TCAM is used for Layer 3 address lookups.

B.

The MAC address table is contained in CAM, and ACL and QoS Information Is stored in TCAM.

C.

CAM Is used by routers for IP address lookups, and TCAM is used to make Layer 2 forwarding decisions.

D.

CAM is used for software switching mechanisms, and TCAM is used for hardware switching mechanisms.

E.

The MAC address table Is contained in TCAM, and ACL and QoS information is stored in CAM.

Buy Now
Questions 97

Refer to the exhibit.

350-401 Question 97

An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?

Options:

A.

The server that is providing the portal has an expired certificate

B.

The server that is providing the portal has a self-signed certificate

C.

The connection is using an unsupported protocol

D.

The connection is using an unsupported browser

Buy Now
Questions 98

An engineer must protect their company against ransom ware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?

Options:

A.

Use Cisco AMP deployment with the Malicious Activity Protection engineer enabled.

B.

Use Cisco AMP deployment with the Exploit Prevention engine enabled.

C.

Use Cisco Firepower and block traffic to TOR networks.

D.

Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation.

Buy Now
Questions 99

Refer to the exhibit.

350-401 Question 99

What is the result when a switch that is running PVST+ is added to this network?

Options:

A.

DSW2 operates in Rapid PVST+ and the new switch operates in PVST+

B.

Both switches operate in the PVST+ mode

C.

Spanning tree is disabled automatically on the network

D.

Both switches operate in the Rapid PVST+ mode.

Buy Now
Questions 100

Refer to the exhibit.

350-401 Question 100

What is required to configure a second export destination for IP address 192.168.10.1?

Options:

A.

Specify a VRF.

B.

Specify a different UDP port.

C.

Specify a different flow ID

D.

Configure a version 5 flow-export to the same destination.

E.

Specify a different TCP port.

Buy Now
Questions 101

What is a characteristic of Cisco StackWise technology?

Options:

A.

It uses proprietary cabling

B.

It supports devices that are geographically separated

C.

lt combines exactly two devices

D.

It is supported on the Cisco 4500 series.

Buy Now
Questions 102

An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?

350-401 Question 102

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 103

Refer to the exhibit.

350-401 Question 103

A network engineer is enabling logging to a local buffer, to the terminal and to a syslog server for all debugging level logs filtered by facility code 7. Which command is needed to complete this configuration snippet?

Options:

A.

logging buffered debugging

B.

logging discriminator Disc1 severity includes 7

C.

logging buffered discriminator Disc1 debugging

D.

logging discriminator Disc1 severity includes 7 facility includes fac7

Buy Now
Questions 104

Refer to the exhibit.

350-401 Question 104

Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0724 network?

A)

350-401 Question 104

B)

350-401 Question 104

C)

350-401 Question 104

D)

350-401 Question 104

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 105

Which protocol is used to encrypt control plane traffic between SD-WAN controllers and SD-WAN endpoints?

Options:

A.

DTLS

B.

IPsec

C.

PGP

D.

HTTPS

Buy Now
Questions 106

An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used.

350-401 Question 106

350-401 Question 106

Options:

Buy Now
Questions 107

Which NGFW mode block flows crossing the firewall?

Options:

A.

Passive

B.

Tap

C.

Inline tap

D.

Inline

Buy Now
Questions 108

An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication Which profile must the engineer edit to achieve this requirement?

Options:

A.

RF

B.

Policy

C.

WLAN

D.

Flex

Buy Now
Questions 109

Refer to the exhibit.

350-401 Question 109

How does the router handle traffic after the CoPP policy is configured on the router?

Options:

A.

Traffic coming to R1 that does not match access list SNMP is dropped.

B.

Traffic coming to R1 that matches access list SNMP is policed.

C.

Traffic passing through R1 that matches access list SNMP is policed.

D.

Traffic generated by R1 that matches access list SNMP is policed.

Buy Now
Questions 110

Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?

Options:

A.

ETR

B.

MR

C.

ITR

D.

MS

Buy Now
Questions 111

350-401 Question 111

Refer to the exhibit. Which configuration must be applied to ensure that the preferred path for traffic from AS 65010 toward AS 65020 uses the R2 to R4 path?

A)

350-401 Question 111

B)

350-401 Question 111

C)

350-401 Question 111

D)

350-401 Question 111

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 112

Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)

Options:

A.

DVPN

B.

NAT

C.

stateful packet inspection

D.

application-level inspection

E.

integrated intrusion prevention

Buy Now
Questions 113

What is the result of applying this access control list?

350-401 Question 113

Options:

A.

TCP traffic with the URG bit set is allowed

B.

TCP traffic with the SYN bit set is allowed

C.

TCP traffic with the ACK bit set is allowed

D.

TCP traffic with the DF bit set is allowed

Buy Now
Questions 114

What is one characteristic of VXLAN?

Options:

A.

It supports a maximum of 4096 VLANs.

B.

It supports multitenant segments.

C.

It uses STP to prevent loops in the underlay network.

D.

It uses the Layer 2 header to transfer packets through the network underlay.

Buy Now
Questions 115

Drag and drop the characteristics from the left onto the deployment models on the right.

350-401 Question 115

Options:

Buy Now
Questions 116

Refer to the exhibit.

350-401 Question 116

What is achieved by the XML code?

Options:

A.

It reads the access list sequence numbers from the output of the show ip access-list extended flp command into a dictionary list.

B.

It displays the output of the show ip access-list extended flp command on the terminal screen

C.

It displays the access list sequence numbers from the output of the show Ip access-list extended flp command on the terminal screen

D.

It reads the output of the show ip access-list extended flp command into a dictionary list.

Buy Now
Questions 117

Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings?

Options:

A.

Command Runner

B.

Template Editor

C.

Application Policies

D.

Authentication Template

Buy Now
Questions 118

Which two pieces of information are necessary to compute SNR? (Choose two.)

Options:

A.

transmit power

B.

noise floor

C.

EIRP

D.

antenna gain

E.

RSSI

Buy Now
Questions 119

Simulation 04

350-401 Question 119

350-401 Question 119

Options:

Buy Now
Questions 120

Refer to the exhibit.

350-401 Question 120

Which HTTP request produced the REST API response that was returned by Cisco DNA Center?

Options:

A.

fetch /network-device?macAddress=ac:4a:56:6c:7c:00

B.

POST/network-device?macAddress=ac:4a:56:6c:7c:00

C.

GET/network-device?macAddress=ac:4a:56:6c:7c:00

Buy Now
Questions 121

Which configuration protects the password for the VTY lines against over-the-shoulder attacks?

Options:

A.

username admin secret 7 6j809j23kpp43883500N7%e$

B.

service password-encryption

C.

line vty 04 password $25$FpM7182!

D.

line vty 0 15

password $25$FpM71f82!

Buy Now
Questions 122

Refer to the exhibit.

350-401 Question 122

Which action results from executing the Python script?

Options:

A.

display the output of a command that is entered on that device in a single line

B.

SSH to the IP address that is manually entered on that device

C.

display the output of a command that is entered on that device

D.

display the unformatted output of a command that is entered on that device

Buy Now
Questions 123

A customer wants to connect a device to an autonomous Cisco AP configured as a WGB. The WGB is configured properly: however, it fails to associate to a CAPWAP- enabled AP. Which change must be applied in the advanced WLAN settings to resolve this issue?

Options:

A.

Enable Aironet IE.

B.

Enable passive client.

C.

Disable AAA override.

D.

Disable FlexConnect local switching.

Buy Now
Questions 124

In which way are EIGRP and OSPF similar?

Options:

A.

They both support unequal-cost load balancing

B.

They both support MD5 authentication for routing updates.

C.

They nave similar CPU usage, scalability, and network convergence times.

D.

They both support autosummarization

Buy Now
Questions 125

In Cisco DNA Center, what is the integration API?

Options:

A.

southbound consumer-facing RESTful API. which enables network discovery and configuration management

B.

westbound interface, which allows the exchange of data to be used by ITSM. IPAM and reporting

C.

an interface between the controller and the network devices, which enables network discovery and configuration management

D.

northbound consumer-facing RESTful API, which enables network discovery and configuration management

Buy Now
Questions 126

A script contains the statement "while loop != 999:" Which value terminates the loop?

Options:

A.

A value equal to 999.

B.

A value less than or equal to 999.

C.

A value not equal to 999.

D.

A value greater than or equal to 999.

Buy Now
Questions 127

350-401 Question 127

Refer to the exhibit. Which configuration set implements Control plane Policing for SSH and Telnet?

350-401 Question 127

350-401 Question 127

350-401 Question 127

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 128

Which tunnel type al'ows clients to perform a seamless Layer 3 roam between a Cisco AireOS WLC and a Cisco IOS XE WLC?

Options:

A.

Ethernet over IP

B.

IPsec

C.

Mobility

D.

VPN

Buy Now
Questions 129

350-401 Question 129

Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?

350-401 Question 129

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 130

Refer to the exhibit.

350-401 Question 130

What happens to access interfaces where VLAN 222 is assigned?

Options:

A.

STP BPDU guard is enabled

B.

A description "RSPAN" is added.

C.

They are placed into an inactive state.

D.

They cannot provide PoE.

Buy Now
Questions 131

Drag and drop the automation characteristics from the left onto the corresponding tools on the right.

350-401 Question 131

Options:

Buy Now
Questions 132

350-401 Question 132

Refer to the exhibit. An engineer attempts to configure standby group 512 on interface GigabitEthernet0/1, but the configuration is not accepted. Which command resolves this problem?

Options:

A.

standby version 2

B.

standby 512 preempt

C.

standby redirects

D.

standby 512 priority 100

Buy Now
Questions 133

An engineer is connected to a Cisco router through a Telnet session. Which command must be issued to view the logging messages from the current session as soon as they are generated by the router?

Options:

A.

logging buffer

B.

service timestamps log uptime

C.

logging host

D.

terminal monitor

Buy Now
Questions 134

By default, which virtual MAC address does HSRP group 12 use?

Options:

A.

00 5e0c:07:ac:12

B.

05:44:33:83:68:6c

C.

00:00:0c:07:ac:0c

D.

00:05:5e:00:0c:12

Buy Now
Questions 135

What is a command-line tool for consuming REST APIs?

Options:

A.

Postman

B.

CURL

C.

Firefox

D.

Python requests

Buy Now
Questions 136

Using the EIRP formula,what parameter is subtracted to determine the EIRP value?

Options:

A.

transmitter power

B.

antenna cable loss

C.

antenna again

D.

signal-to-noise ratio

Buy Now
Questions 137

Refer to the exhibit.

350-401 Question 137

Which configuration enables fallback to local authentication and authorization when no TACACS+ server is available?

Options:

A.

Router(config)# aaa authentication login default local Router(config)# aaa authorization exec default local

B.

Router(config)# aaa authentication login default group tacacs+ local Router(config)# aaa authorization exec default group tacacs+ local

C.

Router(config)# aaa fallback local

D.

Router(config)# aaa authentication login FALLBACK local Router(config)# aaa authorization exec FALLBACK local

Buy Now
Questions 138

Which action limits the total amount of memory and CPU that is used by a collection of VMs?

Options:

A.

Place the collection of VMs in a resource pool.

B.

Place the collection of VMs in a vApp.

C.

Limit the amount of memory and CPU that is available to the cluster.

D.

Limit the amount of memory and CPU that is available to the individual VMs.

Buy Now
Questions 139

An engineer must protect the password for the VTY lines against over-the-shoulder attacks. Which configuration should be applied?

Options:

A.

service password-encryption

B.

username netadmin secret 9 $9$vFpMf8elb4RVV8$seZ/bDA

C.

username netadmin secret 7$1$42J36k33008Pyh4QzwXyZ4

D.

line vty 0 15 p3ssword XD822j

Buy Now
Questions 140

An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:

  • Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.
  • After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.

The contents of the JSON-formatted file are as follows:

350-401 Question 140

Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.

350-401 Question 140

Options:

Buy Now
Questions 141

Refer to the exhibit.

350-401 Question 141

An engineer must send the 172.16.2.0 /24 user traffic to a packet capture tool to troubleshoot an issue. Which action completes the configuration?

Options:

A.

Encrypt the traffic between the users and the monitoring servers.

B.

Disable the spanning tree protocol on the monitoring server VLAN.

C.

Enable the Cisco Discovery Protocol on the server interfaces.

D.

Define the remote span VLAN on SW1 and SW2.

Buy Now
Questions 142

Simulation 06

350-401 Question 142

350-401 Question 142

350-401 Question 142

350-401 Question 142

Options:

Buy Now
Questions 143

350-401 Question 143

Refer to the exhibit Which configuration enables password checking on the console line, using only a password?

A)

350-401 Question 143

B)

350-401 Question 143

C)

350-401 Question 143

D)

350-401 Question 143

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 144

What is the recommended minimum SNR for Voice applications for networks?

Options:

A.

15

B.

20

C.

25

D.

10

Buy Now
Questions 145

Why does the vBond orchestrator have a public IP?

to enable vBond to team the public IP of WAN Edge devices that are behind NAT gateways or in private address space

Options:

A.

to facilitate downloading and distribution of operational and security patches

B.

to allow for global reachability from all WAN Edges in the Cisco SD-WAN and

C.

to facilitate NAT traversal to provide access

D.

to Cisco Smart Licensing servers for license enablement

Buy Now
Questions 146

What is one method for achieving REST API security?

Options:

A.

using built-in protocols known as Web Services Security

B.

using a combination of XML encryption and XML signatures

C.

using a MD5 hash to verify the integrity

D.

using HTTPS and TLS encryption

Buy Now
Questions 147

Drag and drop the characteristics from the left onto the switching architectures on the right.

350-401 Question 147

Options:

Buy Now
Questions 148

What is the function of the fabric control plane node in a Cisco SD-Access deployment?

Options:

A.

It is responsible for policy application and network segmentation in the fabric

B.

It performs traffic encapsulation and security profiles enforcement in the fabric

C.

It holds a comprehensive database that tracks endpoints and networks in the fabric

D.

It provides integration with legacy nonfabric-enabled environments

Buy Now
Questions 149

Which security measure mitigates a man-in-the-middle attack of a REST API?

Options:

A.

SSL certificates

B.

biometric authentication

C.

password hash

D.

non repudiotion feature

Buy Now
Questions 150

What is a characteristic of a traditional WAN?

Options:

A.

low complexity and high overall solution scale

B.

centralized reachability, security, and application policies

C.

operates over DTLS and TLS authenticated and secured tunnels

D.

united data plane and control plane

Buy Now
Questions 151

Reter to the exhibit.

350-401 Question 151

A client requests a new SSID that will use web-based authentication and external RADIUS servers. Which Layer 2 security mode must be selected?

Options:

A.

WPA + WPA2

B.

WPA2 + WPA3

C.

Static WEP

D.

None

Buy Now
Questions 152

350-401 Question 152

Refer to the exhibit. What is the cause of the communication failure between R1 and R4?

Options:

A.

R1 is configured with the no ip unreachables command.

B.

R2 is denying ICMP

C.

R4 is denying ICMP.

D.

R3 is denying ICMP.

Buy Now
Questions 153

Which configuration restricts the amount of SSH traffic that a router accepts to 100 kbps?

A)

350-401 Question 153

B)

350-401 Question 153

C)

350-401 Question 153

D)

350-401 Question 153

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 154

Which authorization framework gives third-party applications limited access to HTTP services?

Options:

A.

iPsec

B.

Basic Auth

C.

GRE

D.

OAuth 2.0

Buy Now
Questions 155

When is GLBP preferred over HSRP?

Options:

A.

When encrypted helm are required between gateways h a single group.

B.

When the traffic load needs to be shared between multiple gateways using a single virtual IP.

C.

When the gateway routers are a mix of Cisco and non-Cisco routers

D.

When clients need the gateway MAC address lo Be the same between multiple gateways

Buy Now
Questions 156

Which function does a virtual switch provide?

Options:

A.

CPU context switching (or multitasking between virtual machines

B.

RAID storage for virtual machines

C.

emulation of power for virtual machines.

D.

connectivity between virtual machines

Buy Now
Questions 157

350-401 Question 157

Refer to the exhibit An engineer is troubleshooting a newly configured BGP peering that does not establish What is the reason for the failure?

Options:

A.

BGP peer 10 255 255 3 is not configured for peenng wth R1

B.

Mandatory BOP parameters between R1 and 10 255 255 3 are mismatched

C.

A firewall is blocking access to TCP port 179 on the BGP peer 10 255 255.3

D.

Both BGP pern are configured for passive TCP transport

Buy Now
Questions 158

Which version of NetFlow does Cisco Threat Defense utilize to obtain visibility into the network?

Options:

A.

NBAR2

B.

IPFIX

C.

8

D.

flexible

Buy Now
Questions 159

What is a client who is running 802.1x for authentication reffered to as?

Options:

A.

supplicant

B.

NAC device

C.

authenticator

D.

policy enforcement point

Buy Now
Questions 160

350-401 Question 160

Refer to the exhibit. An engineer must save the configuration of router R2 using the NETCONF protocol. Which script must be used?

350-401 Question 160

350-401 Question 160

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 161

Which A record type should be configured for access points to resolve the IP address of a wireless LAN controller using DNS?

Options:

A.

CISCO.CONTROLLER.localdomain

B.

CISCO.CAPWAP.CONTROLLER.localdomain

C.

CISCO-CONTROLLER.localdomain

D.

CISCO-CAPWAP-CONTROLLER.localdomain

Buy Now
Questions 162

Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used.

350-401 Question 162

Options:

Buy Now
Questions 163

Which two features are available only in next-generation firewalls? (Choose two.)

Options:

A.

virtual private network

B.

deep packet inspection

C.

stateful inspection

D.

application awareness

E.

packet filtering

Buy Now
Questions 164

Where in Cisco DNA Center is documentation of each API call, organized by its functional area?

Options:

A.

Developer Toolkit

B.

platform management

C.

platform bundles

D.

Runtime Dashboard

Buy Now
Questions 165

Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?

Options:

A.

map server

B.

map resolver

C.

ingress tunnel router

D.

egress tunnel router

Buy Now
Questions 166

What does the destination MAC on the outer MAC header identify in a VXLAN packet?

Options:

A.

thee emote spine

B.

the next hop

C.

the leaf switch

D.

the remote switch

Buy Now
Questions 167

Which element is unique to a Type 2 hypervisor?

Options:

A.

memory

B.

VM OS

C.

host OS

D.

host hardware

Buy Now
Questions 168

Refer to the exhibit.

350-401 Question 168

An engineer applies this configuration to R1:

ip nat inside source static 192.168.10.17 192.168.27.42

Which command set should be added to complete the configuration?

A)

350-401 Question 168

B)

350-401 Question 168

C)

350-401 Question 168

D)

350-401 Question 168

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 169

In a Cisco SD-Access environment, which function is performed by the border node?

Options:

A.

Connect uteri and devices to the fabric domain.

B.

Group endpoints into IP pools.

C.

Provide reachability information to fabric endpoints.

D.

Provide connectivity to traditional layer 3 networks.

Buy Now
Questions 170

Which configuration filters out DOT1X messages in the format shown below from being sent toward Syslog server 10.15.20.33?

A)

350-401 Question 170

B)

350-401 Question 170

C)

350-401 Question 170

D)

350-401 Question 170

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 171

By default, which virtual MAC address does HSRP group 22 use?

Options:

A.

c0:42:01:67:05:16

B.

c0:07:0c:ac:00:22

C.

00:00:0c:07:ac:16

D.

00:00:0c:07:ac:22

Buy Now
Questions 172

Which solution supports end to end line-rate encryption between two sites?

Options:

A.

IPsec

B.

TrustSec

C.

MACseC

D.

GRE

Buy Now
Questions 173

Which two results occur if Cisco DNA center loses connectivity to devices in the SD-ACCESS fabric? (Choose two)

Options:

A.

All devices reload after detecting loss of connection to Cisco DNA Center

B.

Already connected users are unaffected, but new users cannot connect

C.

User connectivity is unaffected

D.

Cisco DNA Center is unable to collect monitoring data in Assurance

E.

Users lose connectivity

Buy Now
Questions 174

How does Cisco Trustsec enable more access controls for dynamic networking

environments and data centers?

Options:

A.

classifies traffic based on advanced application recognition

B.

uses flexible NetFlow

C.

classifies traffic based on the contextual identity of the endpoint rather than its IP

address correct

D.

assigns a VLAN to the endpoint

Buy Now
Questions 175

Which line must be added in the Python function to return the JSON object {"cat_9k": “FXS193202SE")?

350-401 Question 175

A)

350-401 Question 175

B)

350-401 Question 175

C)

350-401 Question 175

D)

350-401 Question 175

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 176

Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?

Options:

A.

All devices integrating with ISE

B.

selected individual devices

C.

all devices in selected sites

D.

all wired devices

Buy Now
Questions 177

Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?

Options:

A.

under interface saturation condition

B.

under network convergence condition

C.

under all network condition

D.

under traffic classification and marking conditions.

Buy Now
Questions 178

What is the recommended MTU size for a Cisco SD-Access Fabric?

Options:

A.

1500

B.

9100

C.

4464

D.

17914

Buy Now
Questions 179

A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)

Options:

A.

Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list

B.

Restore the DCA default settings because this automatically avoids channel interference.

C.

Configure channels on the UNIk2 and the Extended UNII-2 sub-bands of the 5 Ghz band only

D.

Enable DFS channels because they are immune to radar interference.

E.

Disable DFS channels to prevent interference with Doppler radar

Buy Now
Questions 180

Refer to exhibit.

350-401 Question 180

VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?

Options:

A.

SW1 (config)#vtp pruning

B.

SW3(config)#vtp mode transparent

C.

SW2(config)=vtp pruning

D.

SW1 (config >»vtp mode transparent

Buy Now
Questions 181

350-401 Question 181

Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verity the configuration What does the output confirm?

Options:

A.

The first pocket triggered NAT to add on entry to NAT table

B.

R1 is configured with NAT overload parameters

C.

A Telnet from 160.1.1 1 to 10.1.1.10 has been initiated.

D.

R1 to configured with PAT overload parameters

Buy Now
Questions 182

Refer to the exhibit.

350-401 Question 182

An engineer implemented several configuration changes and receives the logging message on switch1. Which action should the engineer take to resolve this issue?

Options:

A.

Change the VTP domain to match on both switches

B.

Change Switch2 to switch port mode dynamic auto

C.

Change Switch1 to switch port mode dynamic auto

D.

Change Switch1 to switch port mode dynamic desirable

Buy Now
Questions 183

Refer to the exhibit.

350-401 Question 183

The EtherChannel between SW2 and SW3 is not operational which action resolves this issue?

Options:

A.

Configure the channel-group mode on SW2 Gi0/1 and Gi0/1 to on.

B.

Configure the channel-group mode on SW3 Gi0/1 to active

C.

Configure the mode on SW2 Gi0/0 to trunk

D.

Configure the mode on SW2 Gi0/1 to access.

Buy Now
Questions 184

Refer to the exhibit.

350-401 Question 184

Which action resolves the EtherChannel issue between SW2 and SW3?

Options:

A.

Configure switchport mode trunk on SW2.

B.

Configure switchport nonegotiate on SW3

C.

Configure channel-group 1 mode desirable on both interfaces.

D.

Configure channel-group 1 mode active on both interfaces.

Buy Now
Questions 185

350-401 Question 185

Refer to the exhibit. External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes this requirement?

A)

350-401 Question 185

B)

350-401 Question 185

C)

350-401 Question 185

D)

350-401 Question 185

E)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 186

Which characteristic distinguishes Ansible from Chef?

Options:

A.

Ansible lacs redundancy support for the master server. Chef runs two masters in an active/active mode.

B.

Ansible uses Ruby to manage configurations. Chef uses YAML to manage configurations.

C.

Ansible pushes the configuration to the client. Chef client pulls the configuration from the server.

D.

The Ansible server can run on Linux, Unix or Windows. The Chef server must run on Linux or Unix.

Buy Now
Questions 187

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?

Options:

A.

NTP server

B.

PKI server

C.

RADIUS server

D.

TACACS server

Buy Now
Questions 188

Refer to the exhibit.

350-401 Question 188

Router 1 is currently operating as the HSRP primary with a priority of 110 router1 fails and router2 take over the forwarding role. Which command on router1 causes it to take over the forwarding role when it return to service?

Options:

A.

standby 2 priority

B.

standby 2 preempt

C.

standby 2 track

D.

standby 2 timers

Buy Now
Questions 189

Refer to the exhibit.

350-401 Question 189

The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?

Options:

A.

event manager applet EEM_IP_SLA

event track 10 state down

B.

event manager applet EEM_IP_SLA

event track 10 state unreachable

C.

event manager applet EEM_IP_SLA

event sla 10 state unreachable

D.

event manager applet EEM_IP_SLA

event sla 10 state down

Buy Now
Questions 190

Which action is the vSmart controller responsible for in an SD-WAN deployment?

Options:

A.

handle, maintain, and gather configuration and status for nodes within the SD-WAN fabric

B.

distribute policies that govern data forwarding performed within the SD-WAN fabric

C.

gather telemetry data from vEdge routers

D.

onboard vEdge nodes into the SD-WAN fabric

Buy Now
Questions 191

Where is radio resource management performed in a cisco SD-access wireless solution?

Options:

A.

DNA Center

B.

control plane node

C.

wireless controller

D.

Cisco CMX

Buy Now
Questions 192

350-401 Question 192

Refer to the exhibit. An engineer configures CoPP and enters the show command to verify the implementation. What is the result of the configuration?

Options:

A.

All traffic will be policed based on access-list 120.

B.

If traffic exceeds the specified rate, it will be transmitted and remarked.

C.

Class-default traffic will be dropped.

D.

ICMP will be denied based on this configuration.

Buy Now
Questions 193

A network engineer is configuring Flexible Netflow and enters these commands

Sampler Netflow1

Mode random one-out-of 100

Interface fastethernet 1/0

Flow-sampler netflow1

Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)

Options:

A.

CPU and memory utilization are reduced.

B.

Only the flows of top 100 talkers are exported

C.

The data export flow is more secure.

D.

The number of packets to be analyzed are reduced

E.

The accuracy of the data to be analyzed is improved

Buy Now
Questions 194

350-401 Question 194

Refer to me exhibit. What is the cause of the log messages?

Options:

A.

hello packet mismatch

B.

OSPF area change

C.

MTU mismatch

D.

IP address mismatch

Buy Now
Questions 195

Which protocol does REST API rely on to secure the communication channel?

Options:

A.

TCP

B.

HTTPS

C.

SSH

D.

HTTP

Buy Now
Questions 196

What is the function of a VTEP in VXLAN?

Options:

A.

provide the routing underlay and overlay for VXLAN headers

B.

dynamically discover the location of end hosts in a VXLAN fabric

C.

encapsulate and de-encapsulate traffic into and out of the VXLAN fabric

D.

statically point to end host locations of the VXLAN fabric

Buy Now
Questions 197

350-401 Question 197

A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?

Options:

A.

The tunnel will be established and work as expected

B.

The tunnel destination will be known via the tunnel interface

C.

The tunnel keepalive is configured incorrectly because they must match on both sites

D.

The default MTU of the tunnel interface is 1500 byte.

Buy Now
Questions 198

How does EIGRP differ from OSPF?

Options:

A.

EIGRP is more prone to routing loops than OSPF

B.

EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost.

C.

EIGRP has a full map of the topology, and OSPF only knows directly connected neighbors

D.

EIGRP uses more CPU and memory than OSPF

Buy Now
Questions 199

What is the function of a fabric border node in a Cisco SD-Access environment?

Options:

A.

To collect traffic flow information toward external networks

B.

To connect the Cisco SD-Access fabric to another fabric or external Layer 3 networks

C.

To attach and register clients to the fabric

D.

To handle an ordered list of IP addresses and locations for endpoints in the fabric.

Buy Now
Questions 200

What are two differences between the RIB and the FIB? (Choose two.)

Options:

A.

The FIB is derived from the data plane, and the RIB is derived from the FIB.

B.

The RIB is a database of routing prefixes, and the FIB is the Information used to choose the egress interface for each packet.

C.

FIB is a database of routing prefixes, and the RIB is the information used to choose the egress interface for each packet.

D.

The FIB is derived from the control plane, and the RIB is derived from the FIB.

E.

The RIB is derived from the control plane, and the FIB is derived from the RIB.

Buy Now
Questions 201

Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?

350-401 Question 201

Options:

A.

from ncclient import

B.

import manager

C.

from ncclient import*

D.

import ncclient manager

Buy Now
Questions 202

What is a benefit of a virtual machine when compared with a physical server?

Options:

A.

Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware.

B.

Virtual machines increase server processing performance.

C.

The CPU and RAM resources on a virtual machine cannot be affected by other virtual machines.

D.

Deploying a virtual machine is technically less complex than deploying a physical server.

Buy Now
Questions 203

350-401 Question 203

Refer to the exhibit. An engineer is investigating why guest users are able to access other guest user devices when the users are connected to the customer guest WLAN. What action resolves this issue?

Options:

A.

implement MFP client protection

B.

implement split tunneling

C.

implement P2P blocking

D.

implement Wi-Fi direct policy

Buy Now
Questions 204

An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?

Options:

A.

wlcbostname.domain.com

B.

cisco-capwap-controller.domain.com

C.

ap-manager.domain.com

D.

primary-wlc.domain.com

Buy Now
Questions 205

Which two methods are used to reduce the AP coverage area? (Choose two)

Options:

A.

Reduce channel width from 40 MHz to 20 MHz

B.

Disable 2.4 GHz and use only 5 GHz.

C.

Reduce AP transmit power.

D.

Increase minimum mandatory data rate

E.

Enable Fastlane

Buy Now
Questions 206

A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?

Options:

A.

Autonomous

B.

Mobility Express

C.

SD-Access wireless

D.

Local mode

Buy Now
Questions 207

350-401 Question 207

Refer to the exhibit. An engineer has configured Cisco ISE to assign VLANs to clients based on their method of authentication, but this is not working as expected. Which action will resolve this issue?

Options:

A.

require a DHCP address assignment

B.

utilize RADIUS profiling

C.

set a NAC state

D.

enable AAA override

Buy Now
Questions 208

What is the differences between TCAM and the MAC address table?

Options:

A.

The MAC address table is contained in TCAM ACL and QoS information is stored in TCAM

B.

The MAC address table supports partial matches. TCAM requires an exact match

C.

Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.

D.

TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables

Buy Now
Questions 209

Which method of account authentication does OAuth 2.0 within REST APIs?

Options:

A.

username/role combination

B.

access tokens

C.

cookie authentication

D.

basic signature workflow

Buy Now
Questions 210

What is a characteristic of MACsec?

Options:

A.

802.1AE provides encryption and authentication services

B.

802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session

C.

802.1AE is bult between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)

D.

802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol

Buy Now
Questions 211

An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?

Options:

A.

Router(config)# ip sla responder udp-connect 172.29.139.134 5000

B.

Router(config)# ip sla responder tcp-connect 172.29.139.134 5000

C.

Router(config)# ip sla responder udp-echo 172.29.139.134 5000

D.

Router(config)# ip sla responder tcp-echo 172.29.139.134 5000

Buy Now
Questions 212

350-401 Question 212

Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

Options:

A.

A NETCONF request was made for a data model that does not exist.

B.

The device received a valid NETCONF request and serviced it without error.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

D.

The NETCONF running datastore is currently locked.

Buy Now
Questions 213

What is a characteristic of YANG?

Options:

A.

It is a Cisco proprietary language that models NETCONF data

B.

It allows model developers to create custom data types

C.

It structures data in an object-oriented fashion to promote model reuse

D.

It provides loops and conditionals to control now within models

Buy Now
Questions 214

What does Call Admission Control require the client to send in order to reserve the bandwidth?

Options:

A.

SIP flow information

B.

Wi-Fi multimedia

C.

traffic specification

D.

VoIP media session awareness

Buy Now
Questions 215

Drag and drop the descriptions from the left onto the QoS components on the right.

350-401 Question 215

Options:

Buy Now
Questions 216

“HTTP/1.1 204 content” is returned when cur –I –x delete command is issued. Which situation has occurred?

Options:

A.

The object could not be located at the URI path.

B.

The command succeeded in deleting the object

C.

The object was located at the URI, but it could not be deleted.

D.

The URI was invalid

Buy Now
Questions 217

Refer to the exhibit.

350-401 Question 217

Assuming the WLC's interfaces are not in the same subnet as the RADIUS server, which interface would the WLC use as the source for all RADIUS-related traffic?

Options:

A.

the interface specified on the WLAN configuration

B.

any interface configured on the WLC

C.

the controller management interface

D.

the controller virtual interface

Buy Now
Questions 218

A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Client connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however, Client roam between the 5520 and 9800 controllers without dropping their connection. Which feature must be configured to remedy the issue?

Options:

A.

mobility MAC on the 5520 cluster

B.

mobility MAC on the 9800 WLC

C.

new mobility on the 5520 cluster

D.

new mobility on the 9800 WLC

Buy Now
Questions 219

Refer to the exhibit.

350-401 Question 219

An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts, drag and drop the commands into the configuration to achieve these results. Some commands may be used more than once. Not all commands are used.

350-401 Question 219

Options:

Buy Now
Questions 220

Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?

Options:

A.

efficient scalability

B.

virtualization

C.

storage capacity

D.

supported systems

Buy Now
Questions 221

Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?

Options:

A.

MTU

B.

Window size

C.

MRU

D.

MSS

Buy Now
Questions 222

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

Options:

A.

SNR

B.

Noise

C.

RSSI

D.

CCI

Buy Now
Questions 223

Drag and drop the characteristics from the left onto the protocols they apply to on the right?

350-401 Question 223

Options:

Buy Now
Questions 224

If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?

Options:

A.

15

B.

1.2

C.

-165

D.

.83

Buy Now
Questions 225

Refer to the exhibit.

350-401 Question 225

An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?

Options:

A.

Configure channel-group 1 mode active on interface Gi0/0.

B.

Configure no shutdown on interface Gi0/0

C.

Enable fast LACP PDUs on interface Gi0/0.

D.

Set LACP max-bundle to 2 on interface Port-channeM

Buy Now
Questions 226

Which two mechanisms are available to secure NTP? (Choose two.)

Options:

A.

IP prefix list-based

B.

IPsec

C.

TACACS-based authentication

D.

IP access list-based

E.

Encrypted authentication

Buy Now
Questions 227

After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?

Options:

A.

BFD

B.

RPVST+

C.

RP failover

D.

NSF

Buy Now
Questions 228

350-401 Question 228

Refer to the exhibit. POSTMAN is showing an attempt to retrieve network device information from Cisco DNA Center API. What is the issue?

Options:

A.

The URI string is incorrect

B.

The token has expired.

C.

Authentication has failed

D.

The JSON payload contains the incorrect UUID

Buy Now
Questions 229

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?

Options:

A.

It is leveraged for dynamic endpoint to group mapping and policy definition.

B.

It provides GUI management and abstraction via apps that share context.

C.

it is used to analyze endpoint to app flows and monitor fabric status.

D.

It manages the LISP EID database.

Buy Now
Questions 230

Which two components are supported by LISP? (Choose two.)

Options:

A.

Proxy ETR

B.

egress tunnel router

C.

route reflector

D.

HMAC algorithm

E.

spoke

Buy Now
Questions 231

An engineer runs the code against an API of Cisco DMA Center, and the platform returns this output What does the response indicate?

350-401 Question 231

Options:

A.

The authentication credentials are incorrect

B.

The URl string is incorrect.

C.

The Cisco DNA Center API port is incorrect

D.

The HTTP method is incorrect

Buy Now
Questions 232

A customer requests a network design that supports these requirements:

350-401 Question 232

Which protocol does the design include?

Options:

A.

HSRP version 2

B.

VRRP version 2

C.

GLBP

D.

VRRP version 3

Buy Now
Questions 233

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

350-401 Question 233

Which two statements does the engineer use to explain these values to the customer? (Choose two)

Options:

A.

The signal strength at location C is too weak to support web surfing

B.

Location D has the strongest RF signal strength

C.

The RF signal strength at location B is 50% weaker than location A

D.

The signal strength at location B is 10 dB better than location C

E.

The RF signal strength at location C is 10 times stronger than location B

 

Buy Now
Questions 234

Drag and drop the virtual components from the left onto their deceptions on the right.

350-401 Question 234

Options:

Buy Now
Questions 235

Refer to the exhibit.

350-401 Question 235

What does the snippet of code achieve?

Options:

A.

It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

B.

It opens a tunnel and encapsulates the login information, if the host key is correct.

C.

It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

D.

It creates an SSH connection using the SSH key that is stored, and the password is ignored.

Buy Now
Questions 236

Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.

350-401 Question 236

Options:

Buy Now
Questions 237

What is a benefit of data modeling languages like YANG?

Options:

A.

They enable programmers to change or write their own application within the device operating system.

B.

They create more secure and efficient SNMP OIDs.

C.

They make the CLI simpler and more efficient.

D.

They provide a standardized data structure, which results in configuration scalability and consistency.

Buy Now
Questions 238

What is a characteristics of a vSwitch?

Options:

A.

supports advanced Layer 3 routing protocols that are not offered by a hardware switch

B.

enables VMs to communicate with each other within a virtualized server

C.

has higher performance than a hardware switch

D.

operates as a hub and broadcasts the traffic toward all the vPorts

Buy Now
Questions 239

Refer to the exhibit.

350-401 Question 239

A network engineer must log in to the router via the console, but the RADIUS servers are not reachable Which credentials allow console access1?

Options:

A.

the username "cisco" and the password "Cisco"

B.

no username and only the password "test123"

C.

no username and only the password "cisco123"

D.

the username "cisco" and the password “cisco123"

Buy Now
Questions 240

Which two Cisco SD-WAN components exchange OMP information?

Options:

A.

vAnaiytlcs

B.

vSmart

C.

WAN Edge

D.

vBond

E.

vManage

Buy Now
Questions 241

350-401 Question 241

Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?

Options:

A.

The ping command must be executed in the global routing table.

B.

Interface FastEthernet0/0 Is configured in VRF CUST-A, so the ARP entry is also in that VRF.

C.

When VRFs are used. ARP protocol must be enabled In each VRF.

D.

When VRFs are used. ARP protocol is disabled in the global routing table.

Buy Now
Questions 242

350-401 Question 242

Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?

Options:

A.

Configure 172.16.20.0 as a stub network.

B.

Apply a policy to filter OSPF packets on R2.

C.

Configure a passive Interface on R2 toward 172.16.20.0.

D.

Configure graceful restart on the 172.16.20.0 interface.

Buy Now
Questions 243

What happens when a FlexConnect AP changes to standalone mode?

Options:

A.

All controller-dependent activities stop working except the DFS.

B.

All client roaming continues to work

C.

Only clients on central switching WLANs stay connected.

D.

All clients on an WLANs are disconnected

Buy Now
Questions 244

Refer to the exhibit.

350-401 Question 244

What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?

Options:

A.

NetFlow updates to the collector are sent 50% less frequently.

B.

Every second IPv4 packet is forwarded to the collector for inspection.

C.

CPU and memory utilization are reduced when compared with what is required for full NetFlow.

D.

The resolution of sampling data increases, but it requires more performance from the router.

Buy Now
Questions 245

Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)

Options:

A.

software-defined segmentation

B.

private VLANs

C.

SD-WAN

D.

modular QoS

E.

identity services

Buy Now
Questions 246

What is one main REST security design principle?

Options:

A.

separation of privilege

B.

password hashing

C.

confidential algorithms

D.

OAuth

Buy Now
Questions 247

What is a characteristics of traffic policing?

Options:

A.

lacks support for marking or remarking

B.

must be applied only to outgoing traffic

C.

can be applied in both traffic directions

D.

queues out-of-profile packets until the buffer is full

Buy Now
Questions 248

Refer to The exhibit.

350-401 Question 248

Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?

Options:

A.

VRF VFN_A

B.

VRF VPN_B

C.

management VRF

D.

default VRF

Buy Now
Questions 249

Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?

Options:

A.

VXLAN

B.

IS-IS

C.

OSPF

D.

LISP

Buy Now
Questions 250

Refer to the exhibit.

350-401 Question 250

The administrator troubleshoots an EtherChannel that keeps moving to err-disabled. Which two actions must be taken to resolve the issue? (Choose two.)

Options:

A.

Reload the switch to force EtherChannel renegotiation

B.

Ensure that interfaces Gi1/0/2 and Gi1/0/3 connect to the same neighboring switch.

C.

Ensure that the switchport parameters of Port channel1 match the parameters of the port channel on the neighbor switch

D.

Ensure that the corresponding port channel interface on the neighbor switch is named Port-channel1.

E.

Ensure that the neighbor interfaces of Gi1/0/2 and Gi/0/3 are configured as members of the same EtherChannel

Buy Now
Questions 251

Refer to the exhibit.

350-401 Question 251

After configuring the BGP network, an engineer verifies that the path between Servers and Server2 Is functional. Why did RouterSF choose the route from RouterDAL instead of the route from RouterCHI?

Options:

A.

The Router-ID Tor Router DAL is lower than the Roter-ID for RouterCHI.

B.

The route from RouterOAL has a lower MED.

C.

BGP is not running on RouterCHI.

D.

There is a static route in RouterSF for 10.0.0.0/24.

Buy Now
Questions 252

What is a characteristic of the overlay network in the Cisco SD-Access architecture?

Options:

A.

It uses a traditional routed access design to provide performance and high availability to the network.

B.

It consists of a group of physical routers and switches that are used to maintain the network.

C.

It provides isolation among the virtual networks and independence from the physical network.

D.

It provides multicast support to enable Layer 2 Hooding capability in the underlay network.

Buy Now
Exam Code: 350-401
Exam Name: Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)
Last Update: Mar 15, 2024
Questions: 843

PDF + Testing Engine

$82.25  $234.99

Testing Engine

$63  $179.99
buy now 350-401 testing engine

PDF (Q&A)

$55.65  $158.99
buy now 350-401 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 19 Mar 2024