Labour Day Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Questions 4

What is one benefit of adopting a data modeling language?

Options:

A.

augmenting management process using vendor centric actions around models

B.

refactoring vendor and platform specific configurations with widely compatible configurations

C.

augmenting the use of management protocols like SNMP for status subscriptions

D.

deploying machine-friendly codes to manage a high number of devices

Buy Now
Questions 5

Which IPv4 packet field carries the QoS IP classification marking?

Options:

A.

ID

B.

TTL

C.

FCS

D.

ToS

Buy Now
Questions 6

What is one main REST security design principle?

Options:

A.

separation of privilege

B.

password hashing

C.

confidential algorithms

D.

OAuth

Buy Now
Questions 7

Which resource is able to be shared among virtual machines deployed on the same physical server?

Options:

A.

applications

B.

disk

C.

VM configuration file

D.

operating system

Buy Now
Questions 8

350-401 Question 8

Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?

350-401 Question 8

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 9

Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?

Options:

A.

mobility

B.

LWAPP

C.

CAPWAP

D.

iPsec

Buy Now
Questions 10

Options:

A.

S2 is configured as LACP. Change the channel group mode to passive

B.

S2 is configured with PAgP. Change the channel group mode to active.

C.

S1 is configured with LACP. Change the channel group mode to on

D.

S1 is configured as PAgP. Change the channel group mode to desirable

Buy Now
Questions 11

Refer to the exhibit.

350-401 Question 11

What are two effect of this configuration? (Choose two.)

Options:

A.

Inside source addresses are translated to the 209.165.201.0/27 subnet.

B.

It establishes a one-to-one NAT translation.

C.

The 10.1.1.0/27 subnet is assigned as the inside global address range.

D.

The 209.165.201.0/27 subnet is assigned as the outside local address range.

E.

The 10.1.1.0/27 subnet is assigned as the inside local addresses.

Buy Now
Questions 12

An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface. Which option also is required on the tunnel interface before it is operational?

Options:

A.

(config-if)#tunnel destination

B.

(config-if)#keepalive

C.

(config-if)#ip mtu

D.

(config-if)#ip tcp adjust-mss

Buy Now
Questions 13

Drag and drop the characteristics from the left onto the technology types on the right.

350-401 Question 13

Options:

Buy Now
Questions 14

Refer to the exhibit.

350-401 Question 14

What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?

Options:

A.

NetFlow updates to the collector are sent 50% less frequently.

B.

Every second IPv4 packet is forwarded to the collector for inspection.

C.

CPU and memory utilization are reduced when compared with what is required for full NetFlow.

D.

The resolution of sampling data increases, but it requires more performance from the router.

Buy Now
Questions 15

Drag anti drop the characteristics from the ten onto the configuration models on the right.

350-401 Question 15

Options:

Buy Now
Questions 16

A large campus network has deployed two wireless LAN controllers to manage the wireless network. WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?

Options:

A.

WLC1 marks me diem with an anchor entry In Its own database. The database entry is copied to the new controller and marked with a foreign entry on VVLC2.

B.

WLC2 marks the client with an anchor entry In Its own database. The database entry Is copied to the new controller and marked with a foreign entry on WLC1

C.

WLCl marks the client with a foreign entry in its own database. The database entry is copied to the new controller and marked with an anchor entry on WLC2.

D.

WLC2 marks the client with a foreign entry In its own database. The database entry Is copied to the new controller and marked with an anchor entry on WLC1.

Buy Now
Questions 17

Refer to the exhibit.

350-401 Question 17

The administrator troubleshoots an EtherChannel that keeps moving to err-disabled. Which two actions must be taken to resolve the issue? (Choose two.)

Options:

A.

Reload the switch to force EtherChannel renegotiation

B.

Ensure that interfaces Gi1/0/2 and Gi1/0/3 connect to the same neighboring switch.

C.

Ensure that the switchport parameters of Port channel1 match the parameters of the port channel on the neighbor switch

D.

Ensure that the corresponding port channel interface on the neighbor switch is named Port-channel1.

E.

Ensure that the neighbor interfaces of Gi1/0/2 and Gi/0/3 are configured as members of the same EtherChannel

Buy Now
Questions 18

By default, which virtual MAC address does HSRP group 32 use?

Options:

A.

00:5e:0c:07:ac:20

B.

04:18:20:83:2e:32

C.

05:5e:5c:ac:0c:32

D.

00:00:0c:07:ac:20

Buy Now
Questions 19

Refer to the exhibit.

350-401 Question 19

An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel Which configuration must be applied?

A)

350-401 Question 19

B)

350-401 Question 19

C)

350-401 Question 19

D)

350-401 Question 19

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 20

What is the purpose of an RP in PIM?

Options:

A.

send join messages toward a multicast source SPT

B.

ensure the shortest path from the multicast source to the receiver

C.

receive IGMP joins from multicast receivers

D.

secure the communication channel between the multicast sender and receiver

Buy Now
Questions 21

Refer to the exhibit.

350-401 Question 21

An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?

Options:

A.

The server that is providing the portal has an expired certificate

B.

The server that is providing the portal has a self-signed certificate

C.

The connection is using an unsupported protocol

D.

The connection is using an unsupported browser

Buy Now
Questions 22

An engineer must protect their company against ransom ware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?

Options:

A.

Use Cisco AMP deployment with the Malicious Activity Protection engineer enabled.

B.

Use Cisco AMP deployment with the Exploit Prevention engine enabled.

C.

Use Cisco Firepower and block traffic to TOR networks.

D.

Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation.

Buy Now
Questions 23

What is the responsibility of a secondary WLC?

Options:

A.

It shares the traffic load of the LAPs with the primary controller.

B.

It avoids congestion on the primary controller by sharing the registration load on the LAPs.

C.

It registers the LAPs if the primary controller fails.

D.

It enables Layer 2 and Layer 3 roaming between Itself and the primary controller.

Buy Now
Questions 24

Refer to the exhibit.

350-401 Question 24

After configuring the BGP network, an engineer verifies that the path between Servers and Server2 Is functional. Why did RouterSF choose the route from RouterDAL instead of the route from RouterCHI?

Options:

A.

The Router-ID Tor Router DAL is lower than the Roter-ID for RouterCHI.

B.

The route from RouterOAL has a lower MED.

C.

BGP is not running on RouterCHI.

D.

There is a static route in RouterSF for 10.0.0.0/24.

Buy Now
Questions 25

What is a characteristics of a vSwitch?

Options:

A.

supports advanced Layer 3 routing protocols that are not offered by a hardware switch

B.

enables VMs to communicate with each other within a virtualized server

C.

has higher performance than a hardware switch

D.

operates as a hub and broadcasts the traffic toward all the vPorts

Buy Now
Questions 26

Which component transports data plane traffic across a Cisco SD-WAN network?

Options:

A.

vSmart

B.

vManage

C.

cEdge

D.

vBond

Buy Now
Questions 27

What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?

Options:

A.

Container

B.

Mainframe

C.

Host

D.

virtual machine

Buy Now
Questions 28

350-401 Question 28

Refer to the exhibit. An engineer is reaching network 172.16.10.0/24 via the R1-R2-R4 path. Which configuration forces the traffic to fake a path of R1-R3-R4?

A)

350-401 Question 28

B)

350-401 Question 28

C)

350-401 Question 28

D)

350-401 Question 28

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 29

In a Cisco SD-Access wireless environment, which device is responsible for hosting the anycast gateway?

Options:

A.

fusion router

B.

control plane node

C.

fabric border node

D.

fabric edge node

Buy Now
Questions 30

Which TLV value must be added to Option 43 when DHCP is used to ensure that APs join the WLC?

Options:

A.

0x77

B.

AAA

C.

0xf1

D.

642

Buy Now
Questions 31

Which tunnel type al'ows clients to perform a seamless Layer 3 roam between a Cisco AireOS WLC and a Cisco IOS XE WLC?

Options:

A.

Ethernet over IP

B.

IPsec

C.

Mobility

D.

VPN

Buy Now
Questions 32

Which OSPF networks types are compatible and allow communication through the two peering devices?

Options:

A.

broadcast to nonbroadcast

B.

point-to-multipoint to nonbroadcast

C.

broadcast to point-to-point

D.

point-to-multipoint to broadcast

Buy Now
Questions 33

Refer to the exhibit.

350-401 Question 33

After an engineer configures an EtherChannel between switch SW1 and switch SW2, this error message is logged on switch SW2.

350-401 Question 33

Based on the output from SW1 and the log message received on Switch SW2, what action should the engineer take to resolve this issue?

Options:

A.

Configure the same protocol on the EtherChannel on switch SW1 and SW2.

B.

Connect the configuration error on interface Gi0/1 on switch SW1.

C.

Define the correct port members on the EtherChannel on switch SW1.

D.

Correct the configuration error on interface Gi0/0 switch SW1.

Buy Now
Questions 34

What NTP Stratum level is a server that is connected directly to an authoritative time source?

Options:

A.

Stratum 0

B.

Stratum 1

C.

Stratum 14

D.

Stratum 15

Buy Now
Questions 35

Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used.

350-401 Question 35

Options:

Buy Now
Questions 36

Refer to the exhibit.

350-401 Question 36

Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?

A)

350-401 Question 36

B)

350-401 Question 36

C)

350-401 Question 36

D)

350-401 Question 36

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 37

350-401 Question 37

Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?

Options:

A.

Configure 172.16.20.0 as a stub network.

B.

Apply a policy to filter OSPF packets on R2.

C.

Configure a passive Interface on R2 toward 172.16.20.0.

D.

Configure graceful restart on the 172.16.20.0 interface.

Buy Now
Questions 38

How cloud deployments differ from on-prem deployments?

Options:

A.

Cloud deployments require longer implementation times than on-premises deployments

B.

Cloud deployments are more customizable than on-premises deployments.

C.

Cloud deployments require less frequent upgrades than on-premises deployments.

D.

Cloud deployments have lower upfront costs than on-premises deployments.

Buy Now
Questions 39

What is a characteristic of the overlay network in the Cisco SD-Access architecture?

Options:

A.

It uses a traditional routed access design to provide performance and high availability to the network.

B.

It consists of a group of physical routers and switches that are used to maintain the network.

C.

It provides isolation among the virtual networks and independence from the physical network.

D.

It provides multicast support to enable Layer 2 Hooding capability in the underlay network.

Buy Now
Questions 40

Refer to the exhibit. A network engineer must block Telnet traffic from hosts in the range of 10.100 2.248 to 10.100.2 255 to the network 10.100.3.0 and permit everything else. Which configuration must the engineer apply'?

350-401 Question 40

A)

350-401 Question 40

B)

350-401 Question 40

C)

350-401 Question 40

D)

350-401 Question 40

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 41

Which cisco DNA center application is responsible for group-based accesss control permissions?

Options:

A.

Design

B.

Provision

C.

Assurance

D.

Policy

Buy Now
Questions 42

350-401 Question 42

Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?

350-401 Question 42

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 43

What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?

Options:

A.

broadcast discover request

B.

join request to all the WLCs

C.

unicast discovery request to each WLC

D.

Unicast discovery request to the first WLS that resolves the domain name

Buy Now
Questions 44

Refer to the exhibit.

350-401 Question 44

An engineer attempts to establish BGP peering between router CORP and two ISP routers. What is the root cause for the failure between CORP and ISP#2?

Options:

A.

Router ISP#2 is configured to use SHA-1 authentication.

B.

There is a password mismatch between router CORP and router ISP#2.

C.

Router CORP is configured with an extended access control list.

D.

MD5 authorization is configured incorrectly on router ISP#2.

Buy Now
Questions 45

How must network management traffic be treated when defining QoS policies?

Options:

A.

as delay-sensitive traffic in a low latency queue

B.

using minimal bandwidth guarantee

C.

using the same marking as IP routing

D.

as best effort

Buy Now
Questions 46

Refer to the exhibit.

350-401 Question 46

A network engineer is enabling logging to a local buffer, to the terminal and to a syslog server for all debugging level logs filtered by facility code 7. Which command is needed to complete this configuration snippet?

Options:

A.

logging buffered debugging

B.

logging discriminator Disc1 severity includes 7

C.

logging buffered discriminator Disc1 debugging

D.

logging discriminator Disc1 severity includes 7 facility includes fac7

Buy Now
Questions 47

What is a characteristic of Cisco DNA Northbound APIs?

Options:

A.

They simplify the management of network infrastructure devices.

B.

They enable automation of network infrastructure based on intent.

C.

They utilize RESTCONF.

D.

They utilize multivendor support APIs.

Buy Now
Questions 48

Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)?

Options:

A.

43

B.

66

C.

69

D.

150

Buy Now
Questions 49

Refer to the exhibit.

350-401 Question 49

After configuring HSRP an engineer enters the show standby command. Which two facts are derived from the output? (Choose two.)

Options:

A.

The router with IP 10.10 1.3 is active because it has a higher IP address

B.

If Fa0/0 is shut down, the HSRP priority on R2 becomes 80

C.

R2 Fa1/0 regains the primary role when the link comes back up

D.

R2 becomes the active router after the hold time expires.

E.

R2 is using the default HSRP hello and hold timers.

Buy Now
Questions 50

Refer to the exhibit.

350-401 Question 50

Cisco DNA Center has obtained the username of the client and the multiple devices that the client is using on the network. How is Cisco DNA Center getting these context details?

Options:

A.

The administrator had to assign the username to the IP address manually in the user database tool on Cisco DNA Center.

B.

Those details are provided to Cisco DNA Center by the Identity Services Engine

C.

Cisco DNA Center pulled those details directly from the edge node where the user connected.

D.

User entered those details in the Assurance app available on iOS and Android devices

Buy Now
Questions 51

Refer to the exhibit.

350-401 Question 51

An engineer is troubleshooting an application running on Apple phones. The application Is receiving incorrect QoS markings. The systems administrator confirmed that ail configuration profiles are correct on the Apple devices. Which change on the WLC optimizes QoS for these devices?

Options:

A.

Enable Fastlane

B.

Set WMM to required

C.

Change the QoS level to Platinum

D.

Configure AVC Profiles

Buy Now
Questions 52

Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic?

Options:

A.

bridge domain

B.

VLAN

C.

VRF

D.

VNI

Buy Now
Questions 53

An engineer must configure AAA on a Cisco 9800 WLC for central web authentication Which two commands are needed to accomplish this task? (Choose two.)

350-401 Question 53

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 54

Refer to the exhibit.

350-401 Question 54

CR2 and CR3 ate configured with OSPF. Which configuration, when applied to CR1. allows CR1 to exchange OSPF Information with CR2 and CR3 but not with other network devices or on new Interfaces that are added to CR1?

A)

350-401 Question 54

B)

350-401 Question 54

C)

350-401 Question 54

D)

350-401 Question 54

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 55

Refer to the exhibit:

350-401 Question 55

An engineer configures VRRP and issues the show commands to verify operation. What does the engineer confirm about VRRP group 1 from the output?

Options:

A.

There is no route to 10.10.1.1/32 in R2’s routing table

B.

If R1 reboots, R2 becomes the master virtual router until R2 reboots

C.

Communication between VRRP members is encrypted using MD5

D.

R1 is primary if 10.10.1.1/32 is in its routing table

Buy Now
Questions 56

Refer to the exhibit.

350-401 Question 56

Which command set must be added to the configuration to analyze 50 packets out of every 100?

A)

350-401 Question 56

B)

350-401 Question 56

C)

350-401 Question 56

D)

350-401 Question 56

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 57

The login method is configured on the VTY lines of a router with these parameters

  • The first method for authentication it TACACS
  • If TACACS is unavailable login is allowed without any provided credentials

Which configuration accomplishes this task?

350-401 Question 57

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 58

An engineer is implementing a Cisco MPLS TE tunnel to improve the streaming experience for the clients of a video-on-demand server. Which action must the engineer perform to configure extended discovery to support the MPLS LDP session between the headend and tailend routers?

Options:

A.

Configure the interface bandwidth to handle TCP and UDP traffic between the LDP peers

B.

Configure a Cisco MPLS TE tunnel on both ends of the session

C.

Configure an access list on the interface to permit TCP and UDP traffic

D.

Configure a targeted neighbor session.

Buy Now
Questions 59

An engineer must export the contents of the devices object in JSON format. Which statement must be used?

350-401 Question 59

Options:

A.

json.repr(Devices)

B.

json.dumps(Devices)

C.

json.prints(Devices)

D.

json.loads(Devices)

Buy Now
Questions 60

When firewall capabilities are considered, which feature is found only in Cisco next-generation firewalls?

Options:

A.

malware protection

B.

stateful inspection

C.

traffic filtering

D.

active/standby high availability

Buy Now
Questions 61

What is one primary REST security design principle?

Options:

A.

fail-safe defaults

B.

password hash

C.

adding a timestamp in requests

D.

OAuth

Buy Now
Questions 62

Refer to the exhibit.

350-401 Question 62

After the code is run on a Cisco IOS-XE router, the response code is 204.

What is the result of the script?

Options:

A.

The configuration fails because another interface is already configured with IP address 10.10.10.1/24.

B.

The configuration fails because interface GigabitEthernet2 is missing on the target device.

C.

The configuration is successfully sent to the device in cleartext.

D.

Interface GigabitEthernet2 is configured with IP address 10.10.10.1/24

Buy Now
Questions 63

Refer to the exhibit.

350-401 Question 63

An engineer must configure static NAT on R1 lo allow users HTTP access to the web server on TCP port 80. The web server must be reachable through ISP 1 and ISP 2. Which command set should be applied to R1 to fulfill these requirements?

Options:

A.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 extendable

ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80 extendable

B.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80

ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80

C.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80

ip nat inside source static tcp 10.1.1.100 8080 209.165.201.1 8080

D.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 no-alias

ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80 no-alias

Buy Now
Questions 64

The login method is configured on the VTY lines of a router with these parameters.

  • The first method for authentication is TACACS
  • If TACACS is unavailable, login is allowed without any provided credentials

Which configuration accomplishes this task?

Options:

A.

R1#sh run | include aaa

aaa new-model

aaa authentication login VTY group tacacs+ none

aaa session-id common

R1#sh run | section vty

line vty 0 4

password 7 0202039485748

R1#sh run | include username

R1#

B.

R1#sh run | include aaa

aaa new-model

aaa authentication login telnet group tacacs+ none

aaa session-id common

R1#sh run | section vty

line vty 0 4

R1#sh run | include username

R1#

C.

R1#sh run | include aaa

aaa new-model

aaa authentication login default group tacacs+ none

aaa session-id common

R1#sh run | section vty

line vty 0 4

password 7 0202039485748

D.

R1#sh run | include aaa

aaa new-model

aaa authentication login default group tacacs+

aaa session-id common

R1#sh run | section vty

line vty 0 4

transport input none

R1#

Buy Now
Questions 65

Refer to the exhibit.

350-401 Question 65

After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?

Options:

A.

The source-interface is configured incorrectly.

B.

The destination must be 172.30.30.2 for icmp-echo

C.

The default route is missing the track feature

D.

The threshold value is wrong.

Buy Now
Questions 66

Refer to the exhibit.

350-401 Question 66

The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?

Options:

A.

event manager applet EEM_IP_SLA

event track 10 state down

B.

event manager applet EEM_IP_SLA

event track 10 state unreachable

C.

event manager applet EEM_IP_SLA

event sla 10 state unreachable

D.

event manager applet EEM_IP_SLA

event sla 10 state down

Buy Now
Questions 67

Drag and drop the virtual components from the left onto their deceptions on the right.

350-401 Question 67

Options:

Buy Now
Questions 68

Refer to the exhibit.

350-401 Question 68

Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?

Options:

A.

ip route vrf Customerl 172.16.1.0 255.255.255.0 172.16.1.1 global

ip route vrf Customer 192.168.1.200 255.255.255.255 192.168.1.1 global

ip route 192.168.1.0 255.255.255.0 VlanlO

ip route 172.16.1.0 255.255.255.0 Vlan20

B.

ip route vrf Customerl 172.16.1.0 255.255.255.0 172.16.1.1 Customer2

ip route vrf Customer 192.168.1.200 255.255.255.255 192.168.1.1 Customerl

C.

ip route vrf Customerl 172.16.1.0 255.255.255.0 172.16.1.1 Customerl

ip route vrf Customer 192.168.1.200 255.255.255.255 192.168.1.1 Customer2

D.

ip route vrf Customerl 172.16.1.1 255.255.255.255 172.16.1.1 global

ip route vrf Customer 192.168.1.200 255.255.255.0 192.168.1.1 global

ip route 192.168.1.0 255.255.255.0 VlanlO

ip route 172.16.1.0 255.255.255.0 Vlan20

Buy Now
Questions 69

What does Call Admission Control require the client to send in order to reserve the bandwidth?

Options:

A.

SIP flow information

B.

Wi-Fi multimedia

C.

traffic specification

D.

VoIP media session awareness

Buy Now
Questions 70

350-401 Question 70

Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. which command resolves the issue?

A)

350-401 Question 70

B)

350-401 Question 70

C)

350-401 Question 70

D)

350-401 Question 70

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 71

Refer to the exhibit.

350-401 Question 71

SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command meets this requirement?

A)

350-401 Question 71

B)

350-401 Question 71

C)

350-401 Question 71

D)

350-401 Question 71

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 72

When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?

Options:

A.

Not all of the controllers in the mobility group are using the same mobility group name.

B.

Not all of the controllers within the mobility group are using the same virtual interface IP address.

C.

All of the controllers within the mobility group are using the same virtual interface IP address.

D.

All of the controllers in the mobility group are using the same mobility group name.

Buy Now
Questions 73

Which two operations are valid for RESTCONF? (Choose two.)

Options:

A.

HEAD

B.

REMOVE

C.

PULL

D.

PATCH

E.

ADD

F.

PUSH

Buy Now
Questions 74

Which device makes the decision for a wireless client to roam?

Options:

A.

wireless client

B.

wireless LAN controller

C.

access point

D.

WCS location server

Buy Now
Questions 75

350-401 Question 75

Refer to the exhibit. An engineer is investigating why guest users are able to access other guest user devices when the users are connected to the customer guest WLAN. What action resolves this issue?

Options:

A.

implement MFP client protection

B.

implement split tunneling

C.

implement P2P blocking

D.

implement Wi-Fi direct policy

Buy Now
Questions 76

Wireless users report frequent disconnections from the wireless network. While troubleshooting a network engineer finds that after the user a disconnect, the connection re-establishes automatically without any input required. The engineer also notices these message logs .

350-401 Question 76

Which action reduces the user impact?

Options:

A.

increase the AP heartbeat timeout

B.

increase BandSelect

C.

enable coverage hole detection

D.

increase the dynamic channel assignment interval

Buy Now
Questions 77

Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.

350-401 Question 77

Options:

Buy Now
Questions 78

What is the difference between CEF and process switching?

Options:

A.

CEF processes packets that are too complex for process switching to manage.

B.

CEF is more CPU-intensive than process switching.

C.

CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet.

D.

Process switching is faster than CEF.

Buy Now
Questions 79

Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?

Options:

A.

event manager applet ondemand

event register

action 1.0 syslog priority critical msg 'This is a message from ondemand'

B.

event manager applet ondemand

event manual

action 1.0 syslog priority critical msg 'This is a message from ondemand'

C.

event manager applet ondemand

event none

action 1.0 syslog priority critical msg 'This is a message from ondemand'

D.

event manager applet ondemand

action 1.0 syslog priority critical msg 'This is a message from ondemand'

Buy Now
Questions 80

Which two components are supported by LISP? (Choose two.)

Options:

A.

Proxy ETR

B.

egress tunnel router

C.

route reflector

D.

HMAC algorithm

E.

spoke

Buy Now
Questions 81

Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?

Options:

A.

MTU

B.

Window size

C.

MRU

D.

MSS

Buy Now
Questions 82

If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?

Options:

A.

15

B.

1.2

C.

-165

D.

.83

Buy Now
Questions 83

What is used to perform OoS packet classification?

Options:

A.

the Options field in the Layer 3 header

B.

the Type field in the Layer 2 frame

C.

the Flags field in the Layer 3 header

D.

the TOS field in the Layer 3 header

Buy Now
Questions 84

Which congestion queuing method on Cisco IOS based routers uses four static queues?

Options:

A.

Priority

B.

custom

C.

weighted fair

D.

low latency

Buy Now
Questions 85

Refer to the exhibit.

350-401 Question 85

Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the network?

Options:

A.

text string

B.

username and password

C.

certificate

D.

RADIUS token

Buy Now
Questions 86

350-401 Question 86

A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?

Options:

A.

The tunnel will be established and work as expected

B.

The tunnel destination will be known via the tunnel interface

C.

The tunnel keepalive is configured incorrectly because they must match on both sites

D.

The default MTU of the tunnel interface is 1500 byte.

Buy Now
Questions 87

What is the function of a fabric border node in a Cisco SD-Access environment?

Options:

A.

To collect traffic flow information toward external networks

B.

To connect the Cisco SD-Access fabric to another fabric or external Layer 3 networks

C.

To attach and register clients to the fabric

D.

To handle an ordered list of IP addresses and locations for endpoints in the fabric.

Buy Now
Questions 88

Refer to exhibit.

350-401 Question 88

VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?

Options:

A.

SW1 (config)#vtp pruning

B.

SW3(config)#vtp mode transparent

C.

SW2(config)=vtp pruning

D.

SW1 (config >»vtp mode transparent

Buy Now
Questions 89

What is a characteristic of a virtual machine?

Options:

A.

It must be aware of other virtual machines, in order to allocate physical resources for them

B.

It is deployable without a hypervisor to host it

C.

It must run the same operating system as its host

D.

It relies on hypervisors to allocate computing resources for it

Buy Now
Questions 90

Refer to the exhibit.

350-401 Question 90

A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?

Options:

A.

aaa authentication login default group ISE-Servers local enable

B.

aaa authentication login default group enable local ISE-Servers

C.

aaa authorization exec default group ISE-Servers local enable

D.

aaa authentication login error-enable

aaa authentication login default group enable local ISE-Servers

Buy Now
Questions 91

Which Python snippet should be used to store the devices data structure in a JSON file?

350-401 Question 91

A)

350-401 Question 91

B)

350-401 Question 91

C)

350-401 Question 91

D)

350-401 Question 91

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 92

Drag and drop the characteristics from the left to the table types on the right.

350-401 Question 92

Options:

Buy Now
Questions 93

Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)

Options:

A.

detect and black ransomware in email attachments

B.

outbound URL analysis and data transfer controls

C.

user context analysis

D.

blocking of fileless malware in real time

E.

cloud-based analysis of threats

Buy Now
Questions 94

What Is the difference between the MAC address table and TCAM?

Options:

A.

The MAC address table supports partial matches. TCAM requires an exact match.

B.

The MAC address table is contained in TCAM ACL and QoS information is stored in CAM.

C.

Router prefix lookups happen in TCAM. MAC address table lookups happen In CAM.

D.

TCAM is used to make L2 forwarding decisions. CAM is used to build routing tables

Buy Now
Questions 95

350-401 Question 95

Refer to the exhibit. Which configuration must be added to enable GigabitEthemet 0/1 to participate in OSPF?

Options:

A.

SF_router (config-router)# network 10.10.1.0 0.0.0.255 area 0

B.

SF_rouier (conng)# network 10.10.1.0 0.0.0.255 area 1

C.

SF_router (conflg-routerp) network 10.10.1.0 0.0.0.255 area 1

D.

SF_rouler (contlg-rouler)# network 10.10.1.0 255.255.255.0 area 0

Buy Now
Questions 96

Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

350-401 Question 96

Options:

Buy Now
Questions 97

An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?

350-401 Question 97

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 98

Which method is used by an AP to join HA controllers and is configured in NVRAM?

Options:

A.

stored WLC information

B.

DNS

C.

IP Helper Addresses

D.

Primary/Secondary/Tertiary/Backup

Buy Now
Questions 99

If a client's radio device receives a signal strength of -67 dBm and the noise floor is -85 dBm, what is the SNR value?

Options:

A.

15 dB

B.

16 dB

C.

18 dB

D.

20 dB

Buy Now
Questions 100

Drag and drop the snippets onto the blanks within the code to construct a script that configures BGP according to the topology. Not all options are used, and some options may be used twice.

350-401 Question 100

Options:

Buy Now
Questions 101

Drag and drop the characteristics from the left onto the routing protocols they describe on the right

350-401 Question 101

Options:

Buy Now
Questions 102

A network engineer must configure a router to send logging messages to a syslog server based on these requirements:

  • uses syslog IP address: 10.10.10.1
  • uses a reliable protocol
  • must not use any well-known TCP/UDP ports

Which configuration must be used?

Options:

A.

logging host 10.10.10.1 transport tcp port 1024

B.

logging origin-id 10.10.10.1

C.

logging host 10.10.10.1 transport udp port 1023

D.

logging host 10.10.10.1 transport udp port 1024

Buy Now
Questions 103

An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?

350-401 Question 103

Options:

A.

action 1 syslog msg "OSPF ROUTING ERROR"

B.

action 1 syslog send "OSPF ROUTING ERROR"

C.

action 1 syslog pattern "OSPF ROUTING ERROR"

D.

action 1syslog write "OSPF ROUTING ERROR"

Buy Now
Questions 104

350-401 Question 104

Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?

Options:

A.

show netconf | section rpc-reply

B.

show netconf rpc-reply

C.

show netconf xml rpc-reply

D.

show netconf schema | section rpc-reply

Buy Now
Questions 105

Refer to the exhibit.

350-401 Question 105

An engineer reconfigures the pot-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1's log.

Which command set resolves this error?

A)

350-401 Question 105

B)

350-401 Question 105

C)

350-401 Question 105

D)

350-401 Question 105

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 106

350-401 Question 106

Refer to me exhibit. What is the cause of the log messages?

Options:

A.

hello packet mismatch

B.

OSPF area change

C.

MTU mismatch

D.

IP address mismatch

Buy Now
Questions 107

Refer to the exhibit.

350-401 Question 107

The EtherChannel between SW2 and SW3 is not operational which action resolves this issue?

Options:

A.

Configure the channel-group mode on SW2 Gi0/1 and Gi0/1 to on.

B.

Configure the channel-group mode on SW3 Gi0/1 to active

C.

Configure the mode on SW2 Gi0/0 to trunk

D.

Configure the mode on SW2 Gi0/1 to access.

Buy Now
Questions 108

Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?

Options:

A.

under interface saturation condition

B.

under network convergence condition

C.

under all network condition

D.

under traffic classification and marking conditions.

Buy Now
Questions 109

Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?

350-401 Question 109

Options:

A.

from ncclient import

B.

import manager

C.

from ncclient import*

D.

import ncclient manager

Buy Now
Questions 110

Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?

A)

350-401 Question 110

B)

350-401 Question 110

C)

350-401 Question 110

D)

350-401 Question 110

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 111

Where is radio resource management performed in a cisco SD-access wireless solution?

Options:

A.

DNA Center

B.

control plane node

C.

wireless controller

D.

Cisco CMX

Buy Now
Questions 112

A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)

Options:

A.

Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list

B.

Restore the DCA default settings because this automatically avoids channel interference.

C.

Configure channels on the UNIk2 and the Extended UNII-2 sub-bands of the 5 Ghz band only

D.

Enable DFS channels because they are immune to radar interference.

E.

Disable DFS channels to prevent interference with Doppler radar

Buy Now
Questions 113

350-401 Question 113

Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?

Options:

A.

ISAKMP SA is authenticated and can be used for Quick Mode.

B.

Peers have exchanged keys, but ISAKMP SA remains unauthenticated.

C.

VPN peers agreed on parameters for the ISAKMP SA

D.

ISAKMP SA has been created, but it has not continued to form.

Buy Now
Questions 114

Which measure is used by an NTP server to indicate its closeness to the authoritative time source?

Options:

A.

latency

B.

hop count

C.

time zone

D.

stratum

Buy Now
Questions 115

Which action is the vSmart controller responsible for in an SD-WAN deployment?

Options:

A.

handle, maintain, and gather configuration and status for nodes within the SD-WAN fabric

B.

distribute policies that govern data forwarding performed within the SD-WAN fabric

C.

gather telemetry data from vEdge routers

D.

onboard vEdge nodes into the SD-WAN fabric

Buy Now
Questions 116

350-401 Question 116

Refer to the exhibit How was spanning-tree configured on this interface?

Options:

A.

By entering the command spanning-tree portfast trunk in the interface configuration mode.

B.

By entering the command spanning-tree portfast in the interface configuration mode

C.

By entering the command spanning-tree mst1 vlan 10,20,30,40 in the global configuration mode

D.

By entering the command spanning-tree vlan 10,20,30,40 root primary in the interface configuration mode

Buy Now
Questions 117

What are two characteristics of VXLAN? (Choose two)

Options:

A.

It uses VTEPs to encapsulate and decapsulate frames.

B.

It has a 12-bit network identifier

C.

It allows for up to 16 million VXLAN segments

D.

It lacks support for host mobility

E.

It extends Layer 2 and Layer 3 overlay networks over a Layer 2 underlay.

Buy Now
Questions 118

How does the RIB differ from the FIB?

Options:

A.

The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.

B.

The FIB includes many routes a single destination. The RIB is the best route to a single destination.

C.

The RIB includes many routes to the same destination prefix. The FIB contains only the best route

D.

The FIB maintains network topologies and routing tables. The RIB is a Iist of routes to particular network destinations.

Buy Now
Questions 119

What is the function of the LISP map resolver?

Options:

A.

to send traffic to non-LISP sites when connected to a service provider that does not accept nonroutable ElDs as packet sources

B.

to connect a site to the LISP-capable part of a core network publish the EID-to-RLOC mappings for the site, and respond to map-request messages

C.

to decapsulate map-request messages from ITRs and forward the messages to the MS.

D.

to advertise routable non-LISP traffic from one address family to LISP sites in a different address family

Buy Now
Questions 120

Refer to Exhibit.

350-401 Question 120

MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?

Options:

A.

The packet arrives on router C without fragmentation.

B.

The packet is discarded on router A

C.

The packet is discarded on router B

D.

The packet arrives on router C fragmented.

Buy Now
Questions 121

Refer to the exhibit.

350-401 Question 121

A network engineer configures a GRE tunnel and enters the show Interface tunnel command. What does the output confirm about the configuration?

Options:

A.

The keepalive value is modified from the default value.

B.

Interface tracking is configured.

C.

The tunnel mode is set to the default.

D.

The physical interface MTU is 1476 bytes.

Buy Now
Questions 122

Which protocol does REST API rely on to secure the communication channel?

Options:

A.

TCP

B.

HTTPS

C.

SSH

D.

HTTP

Buy Now
Questions 123

At which Layer does Cisco DNA Center support REST controls?

Options:

A.

EEM applets or scripts

B.

Session layer

C.

YMAL output from responses to API calls

D.

Northbound APIs

Buy Now
Questions 124

Drag and drop the Qos mechanisms from the left to the correct descriptions on the right

350-401 Question 124

Options:

Buy Now
Questions 125

Which line must be added in the Python function to return the JSON object {"cat_9k": “FXS193202SE")?

350-401 Question 125

A)

350-401 Question 125

B)

350-401 Question 125

C)

350-401 Question 125

D)

350-401 Question 125

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 126

Refer to the exhibit.

350-401 Question 126

An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as an entry point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?

350-401 Question 126

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 127

After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?

Options:

A.

BFD

B.

RPVST+

C.

RP failover

D.

NSF

Buy Now
Questions 128

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

350-401 Question 128

Which two statements does the engineer use to explain these values to the customer? (Choose two)

Options:

A.

The signal strength at location C is too weak to support web surfing

B.

Location D has the strongest RF signal strength

C.

The RF signal strength at location B is 50% weaker than location A

D.

The signal strength at location B is 10 dB better than location C

E.

The RF signal strength at location C is 10 times stronger than location B

 

Buy Now
Questions 129

Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?

A)

350-401 Question 129

B)

350-401 Question 129

C)

350-401 Question 129

D)

350-401 Question 129

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 130

350-401 Question 130

Refer to the exhibit. An engineer configures CoPP and enters the show command to verify the implementation. What is the result of the configuration?

Options:

A.

All traffic will be policed based on access-list 120.

B.

If traffic exceeds the specified rate, it will be transmitted and remarked.

C.

Class-default traffic will be dropped.

D.

ICMP will be denied based on this configuration.

Buy Now
Questions 131

Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used.

350-401 Question 131

Options:

Buy Now
Questions 132

What is one being of implementing a data modetag language?

Options:

A.

accuracy of the operations performed

B.

uses XML style of data formatting

C.

machine-oriented logic and language-facilitated processing.

D.

conceptual representation to simplify interpretation.

Buy Now
Questions 133

Which DNS lookup does an access point perform when attempting CAPWAP discovery?

Options:

A.

CISCO-DNA-CONTROLLER local

B.

CAPWAP-CONTROLLER local

C.

CISCO-CONTROLLER local

D.

CISCO-CAPWAP-CONTROLLER local

Buy Now
Questions 134

An engineer must configure a multicast UDP jitter operation. Which configuration should be applied?

A)

350-401 Question 134

B)

350-401 Question 134

C)

350-401 Question 134

D)

350-401 Question 134

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 135

350-401 Question 135

Refer to the exhibit. Which command set completes the ERSPAN session configuration?

350-401 Question 135

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 136

Which hypervisor requires a host OS to run and is not allowed to directly access the hosts hardware and resources?

Options:

A.

native

B.

bare metal

C.

type 1

D.

type 2

Buy Now
Questions 137

Which of the following security methods uses physical characteristics of a person to authorize access to a location?

Options:

A.

Access control vestibule

B.

Palm scanner

C.

PIN pad

D.

Digital card reader

E.

Photo ID

Buy Now
Questions 138

Refer to the exhibit.

350-401 Question 138

Which action must be taken to configure a WLAN for WPA2-AES with PSK and allow only 802.l1r-capable clients to connect?

Options:

A.

Change Fast Transition to Adaptive Enabled and enable FT * PSK

B.

Enable Fast Transition and FT + PSK.

C.

Enable Fast Transition and PSK

D.

Enable PSK and FT + PSK.

Buy Now
Questions 139

By default, which virtual MAC address does HSRP group 12 use?

Options:

A.

00 5e0c:07:ac:12

B.

05:44:33:83:68:6c

C.

00:00:0c:07:ac:0c

D.

00:05:5e:00:0c:12

Buy Now
Questions 140

How is traffic classified when using Cisco TrustSec technology?

Options:

A.

with the VLAN

B.

with the MAC address

C.

with the IP address

D.

with the security group tag

Buy Now
Questions 141

350-401 Question 141

Refer to the exhibit. Traffic is not passing between SW1 and SW2. Which action fixes the issue?

Options:

A.

Configure LACP mode on S1 to passive.

B.

Configure switch port mode to ISL on S2.

C.

Configure PAgP mode on S1 to desirable.

D.

Configure LACP mode on S1 to active.

Buy Now
Questions 142

350-401 Question 142

Refer to the exhibit. An engineer must save the configuration of router R2 using the NETCONF protocol. Which script must be used?

350-401 Question 142

350-401 Question 142

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 143

Which function does a virtual switch provide?

Options:

A.

CPU context switching (or multitasking between virtual machines

B.

RAID storage for virtual machines

C.

emulation of power for virtual machines.

D.

connectivity between virtual machines

Buy Now
Questions 144

350-401 Question 144

Refer to the exhibit. An engines configured TACACS^ to authenticate remote users but the configuration is not working as expected Which configuration must be applied to enable access?

A)

350-401 Question 144

B)

350-401 Question 144

C)

350-401 Question 144

D)

350-401 Question 144

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 145

Which QoS feature uses the IP Precedence bits in the ToS field of the IP packet header to partition traffic into different priority levels?

Options:

A.

marking

B.

shaping

C.

policing

D.

classification

Buy Now
Questions 146

Which action limits the total amount of memory and CPU that is used by a collection of VMs?

Options:

A.

Place the collection of VMs in a resource pool.

B.

Place the collection of VMs in a vApp.

C.

Limit the amount of memory and CPU that is available to the cluster.

D.

Limit the amount of memory and CPU that is available to the individual VMs.

Buy Now
Questions 147

Which two security features are available when implementing NTP? (Choose two.)

Options:

A.

symmetric server passwords

B.

dock offset authentication

C.

broadcast association mode

D.

encrypted authentication mechanism

E.

access list-based restriction scheme

Buy Now
Questions 148

What is a characteristics of VXLAN?

Options:

A.

It extends Layer 2 and Layer 3 overlay networks over a Layer 2 underlay.

B.

It has a 12-byt packet header.

C.

It frame encapsulation is performed by MAC-In-UDP

D.

It uses TCP for transport

Buy Now
Questions 149

What does the destination MAC on the outer MAC header identify in a VXLAN packet?

Options:

A.

thee emote spine

B.

the next hop

C.

the leaf switch

D.

the remote switch

Buy Now
Questions 150

Which access control feature does MAB provide?

Options:

A.

user access based on IP address

B.

allows devices to bypass authenticate*

C.

network access based on the physical address of a device

D.

simultaneous user and device authentication

Buy Now
Questions 151

A customer has a wireless network deployed within a multi-tenant building. The network provides client access, location-based services, and is monitored using Cisco DNA Center. The security department wants to locate and track malicious devices based on threat signatures. Which feature is required for this solution?

Options:

A.

Cisco aWIPS policies on the WLC

B.

Cisco aWIPS policies on Cisco DNA Center

C.

malicious rogue rules on the WLC

D.

malicious rogue rules on Cisco DNA Center

Buy Now
Questions 152

Drag and drop the characteristics from the left onto the deployment model on the right.

350-401 Question 152

Options:

Buy Now
Questions 153

350-401 Question 153

Refer to the exhibit. Why was the response code generated?

Options:

A.

The resource was unreachable

B.

Access was denied based on the user permissions.

C.

The resource 15 no longer available on the server.

D.

There Is a conflict in the current stale of the resource.

Buy Now
Questions 154

Simulation 09

350-401 Question 154

350-401 Question 154

350-401 Question 154

Options:

Buy Now
Questions 155

Which language defines the structure or modelling of data for NETCONF and RESTCONF?

Options:

A.

YAM

B.

YANG

C.

JSON

D.

XML

Buy Now
Questions 156

Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)

Options:

A.

DVPN

B.

NAT

C.

stateful packet inspection

D.

application-level inspection

E.

integrated intrusion prevention

Buy Now
Questions 157

What is stateful switchover?

Options:

A.

mechanism used to prevent routing protocol loops during an RP switchover

B.

mechanism to take control from a failed RP while maintaining connectivity

C.

First Hop Redundancy Protocol for host gateway connectivity

D.

cluster protocol used to facilitate switch faitover

Buy Now
Questions 158

Which technology enables a redundant supervisor engine to take over when the primary supervisor engine fails?

Options:

A.

NSF

B.

graceful restart

C.

SSO

D.

FHRP

Buy Now
Questions 159

An engineer receives a report that an application exhibits poor performance. On the switch where the server is connected, this syslog message is visible:

SW_MATM4-MACFLAP_N0HF: Host 0054.3831.8253 in vlan 14 is flapping between port GUAM and port Gi1/0/2.

What is causing the problem?

Options:

A.

wrong SFP+ and cable connected between the server and the switch

B.

undesirable load-balancing configuration on the switch

C.

failed NIC on the server

D.

invalid port channel configuration on the switch

Buy Now
Questions 160

Simulation 04

Configure OSPF on both routers according to the topology to achieve these goals:

350-401 Question 160

350-401 Question 160

Options:

Buy Now
Questions 161

Drag and drop the characteristics from the left onto the deployment models on the right.

350-401 Question 161

Options:

Buy Now
Questions 162

350-401 Question 162

Refer to the exhibit Which configuration enables password checking on the console line, using only a password?

A)

350-401 Question 162

B)

350-401 Question 162

C)

350-401 Question 162

D)

350-401 Question 162

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 163

Which two pieces of information are necessary to compute SNR? (Choose two.)

Options:

A.

transmit power

B.

noise floor

C.

EIRP

D.

antenna gain

E.

RSSI

Buy Now
Questions 164

350-401 Question 164

Refer to the exhibit. An engineer must allow the FTP traffic from users on 172.16.1.0 /24 to 172.16.2.0 /24 and block all other traffic. Which configuration must be applied?

A)

350-401 Question 164

B)

350-401 Question 164

C)

350-401 Question 164D)

350-401 Question 164

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 165

Reter to the exhibit.

350-401 Question 165

A client requests a new SSID that will use web-based authentication and external RADIUS servers. Which Layer 2 security mode must be selected?

Options:

A.

WPA + WPA2

B.

WPA2 + WPA3

C.

Static WEP

D.

None

Buy Now
Questions 166

When a branch location loses connectivity, which Cisco FlexConnect state rejects new users but allows existing users to function normally?

Options:

A.

Authentication-Down / Switch-Local

B.

Authentication-Down / Switching-Down

C.

Authentication-Local / Switch-Local

D.

Authentication-Central f Switch-Local

Buy Now
Questions 167

350-401 Question 167

Refer to the exhibit. Link 1 uses a copper connection and link 2 uses a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by Spanning Tree. After entering the spanning-tree port-priority 32 command on G0/1 on SW2, the port remains blocked. Which command should be entered on the ports connected to Link 2 is resolve the issue?

Options:

A.

Enter spanning-tree port-priority 64 on SW2

B.

Enter spanning-tree port-priority 224 on SW1.

C.

Enter spanning-tree port-priority 4 on SW2.

D.

Enter spanning-tree port-priority 32 on SW1.

Buy Now
Questions 168

A network administrator is preparing a Python scrip to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running. Which operation of he in client manager prevent colleague making changes to the device while the scrip is running?

Options:

A.

m.lock(config=’running’)

B.

m.lock(target=’running’)

C.

m.freeze(target=’running’)

D.

m.freeze(config=’running’)

Buy Now
Questions 169

350-401 Question 169

Refer to the exhibit. What are two results of the NAT configuration? (Choose two.)

Options:

A.

Packets with a destination of 200.1.1.1 are translated to 10.1.1.1 or .2. respectively.

B.

A packet that is sent to 200.1.1.1 from 10.1.1.1 is translated to 209.165.201.1 on R1.

C.

R1 looks at the destination IP address of packets entering S0/0 and destined for inside hosts.

D.

R1 processes packets entering E0/0 and S0/0 by examining the source IP address.

E.

R1 is performing NAT for inside addresses and outside address.

Buy Now
Questions 170

Which DNS lookup does an AP perform when attempting CAPWAP discovery?

Options:

A.

CAPWAP-CONTROLLER.Iocal

B.

CISCO-CAPWAP-CONTROLLER.Iocal

C.

CISCO-DNA-CONTROLLER.Iocal

D.

CISCO-CONTROLLER.Iocal

Buy Now
Questions 171

350-401 Question 171

Refer to the exhibit Which command must be applied to complete the configuration and enable RESTCONF?

Options:

A.

ip http secure-server

B.

ip http server

C.

ip http secure-port 443

D.

ip http client username restconf

Buy Now
Questions 172

In which way are EIGRP and OSPF similar?

Options:

A.

They both support unequal-cost load balancing

B.

They both support MD5 authentication for routing updates.

C.

They nave similar CPU usage, scalability, and network convergence times.

D.

They both support autosummarization

Buy Now
Questions 173

Refer to the exhibit.

350-401 Question 173

Refer to the exhibit. An engineer must implement HSRP between two WAN routers. In the event R1 tails and then regains operational status, it must allow 100 seconds for the routing protocol to converge before preemption takes effect. Which configuration is required?

A)

350-401 Question 173

B)

350-401 Question 173

C)

350-401 Question 173

D)

350-401 Question 173

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 174

What does the statement print(format(0.8, '.0%')) display?

Options:

A.

80%

B.

8%

C.

.08%

D.

8.8%

Buy Now
Questions 175

Which unit of measure is used to measure wireless RF SNR?

Options:

A.

mW

B.

bBm

C.

dB

D.

dBi

Buy Now
Questions 176

Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?

Options:

A.

map server

B.

map resolver

C.

ingress tunnel router

D.

egress tunnel router

Buy Now
Questions 177

Which method ensures the confidentiality ot data exchanged over a REST API?

Options:

A.

Use the POST method instead of URL-encoded GET to pass parameters.

B.

Encode sensitive data using Base64 encoding.

C.

Deploy digest-based authentication to protect the access to the API.

D.

Use TLS to secure the underlying HTTP session.

Buy Now
Questions 178

Drag and drop the tools from the left onto the agent types on the right.

350-401 Question 178

Options:

Buy Now
Questions 179

Based on the router's API output In JSON format below, which Python code will display the value of the 'role' key?

350-401 Question 179

350-401 Question 179

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 180

Which A record type should be configured for access points to resolve the IP address of a wireless LAN controller using DNS?

Options:

A.

CISCO.CONTROLLER.localdomain

B.

CISCO.CAPWAP.CONTROLLER.localdomain

C.

CISCO-CONTROLLER.localdomain

D.

CISCO-CAPWAP-CONTROLLER.localdomain

Buy Now
Questions 181

: 262 DRAG DROP

Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used.

350-401 Question 181

Options:

Buy Now
Questions 182

An engineer must protect the password for the VTY lines against over-the-shoulder attacks. Which configuration should be applied?

Options:

A.

service password-encryption

B.

username netadmin secret 9 $9$vFpMf8elb4RVV8$seZ/bDA

C.

username netadmin secret 7$1$42J36k33008Pyh4QzwXyZ4

D.

line vty 0 15 p3ssword XD822j

Buy Now
Questions 183

350-401 Question 183

Refer to the exhibit. What is printed to the console when this script is run?

Options:

A.

a key-value pair in tuple type

B.

a key-value pair in list type

C.

a key-value pair in string type

D.

an error

Buy Now
Questions 184

350-401 Question 184

Refer to the exhibit. R1 and R2 are directly connected, but the BGP session does not establish. Which action must be taken to build an eBGP session?

Options:

A.

Configure ip route 1.1.1.1 0.0.0.0 192.168.12.1 on R2.

B.

Configure neighbor 192.168.12.1 activate under R2 BGP process.

C.

Configure neighbor 2.2.2.2 remote-as 65002 under R1 BGP process.

D.

Configure no neighbor 192.168.12.1 shutdown under R2 BGP process.

Buy Now
Questions 185

An engineer must contigure a rou'.er to allow users to run specHic configuration commands by validating the user against the router database. Which configuration must be applied?

Options:

A.

aaa authentication network default local

B.

aaa authentication exec default local

C.

aaa authorization exec default local

D.

aaa authorization network default local

Buy Now
Questions 186

How is a data modelling language used?

Options:

A.

To enable data to be easily structured, grouped, validated, and replicated.

B.

To represent finite and well-defined network elements that cannot be changed.

C.

To model the flows of unstructured data within the infrastructure

D.

To provide human readability to scripting languages

Buy Now
Questions 187

350-401 Question 187

Refer to the exhibit. A network engineer Is troubleshooting an Issue with the file server based on reports of slow file transmissions. Which two commands or command sets are required. In switch SW1 to analyze the traffic from the file server with a packet analyzer? (Choose two.)

A)

350-401 Question 187

B)

350-401 Question 187

C)

350-401 Question 187

D)

350-401 Question 187

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 188

Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?

Options:

A.

underlay network

B.

VPN routing/forwarding

C.

easy virtual network

D.

overlay network

Buy Now
Questions 189

Which activity requires access to Cisco DNA Center CLI?

Options:

A.

provisioning a wireless LAN controller

B.

creating a configuration template

C.

upgrading the Cisco DNA Center software

D.

graceful shutdown of Cisco DNA Center

Buy Now
Questions 190

Refer to the exhibit.

350-401 Question 190

An engineer must allow all users in the 10.2.2.0/24 subnet to access the Internet. To conserve address space the public Interface address of 209 165 201.1 must be used for all external communication. Which command set accomplishes these requirements?

A)

350-401 Question 190

B)

350-401 Question 190

C)

350-401 Question 190

D)

350-401 Question 190

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 191

350-401 Question 191

Refer to the exhibit. A network engineer must load balance traffic that comes from the NAT Router and is destined to 10.10.110.10, to several FTP servers. Which two commands sets should be applied? (Choose two).

A)

350-401 Question 191

B)

350-401 Question 191

C)

350-401 Question 191

D)

350-401 Question 191

E)

350-401 Question 191

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 192

By default, which virtual MAC address Goes HSRP group 25 use?

Options:

A.

05:5c:5e:ac:0c:25

B.

04:16:6S:96:1C:19

C.

00:00:0c:07:ac:19

D.

00:00:0c:07:ac:25

Buy Now
Questions 193

Which benefit is realized by implementing SSO?

Options:

A.

IP first-hop redundancy

B.

communication between different nodes for cluster setup

C.

physical link redundancy

D.

minimal network downtime following an RP switchover

Buy Now
Questions 194

A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?

Options:

A.

economy of mechanism

B.

complete mediation

C.

separation of privilege

D.

least common mechanism

Buy Now
Questions 195

Reter to the exhibit.

350-401 Question 195

An administrator troubleshoots intermittent connectivity from internal hosts to an external public server. Some internal hosts can connect to the server while others receive an ICMP Host Unreachable message and these hosts change over time. What is the cause of this issue?

Options:

A.

The translator does not use aOdress overloading

B.

The NAT ACL does not match alt internal hosts

C.

The NAT ACL and NAT pool share the same name

D.

The NAT pool netmask rs excessively wide

Buy Now
Questions 196

An engineer must configure an EXEC authorization list that first checks a AAA server then a local username. If both methods fail, the user is denied. Which configuration should be applied?

Options:

A.

aaa authorization exec default local group tacacs+

B.

aaa authorization exec default local group radius none

C.

aaa authorization exec default group radius local none

D.

aaa authorization exec default group radius local

Buy Now
Questions 197

Refer to the exhibit.

350-401 Question 197

On which interfaces should VRRP commands be applied to provide first hop redundancy to PC-01 and PC-02?

Options:

A.

G0/0 and G0/1 on Core

B.

G0/0 on Edge-01 and G0/0 on Edge-02

C.

G0/1on Edge-01 and G0/1 on Edge-02

D.

G0/0 and G0/1 on ASW-01

Buy Now
Questions 198

350-401 Question 198

Refer to the exhibit. Which result does the python code achieve?

Options:

A.

The code encrypts a base64 decrypted password.

B.

The code converts time to the "year/month/day" time format.

C.

The code converts time to the yyyymmdd representation.

D.

The code converts time to the Epoch LINUX time format.

Buy Now
Questions 199

Which two GRE features are configured to prevent fragmentation? (Choose two.)

Options:

A.

TCP MSS

B.

PMTUD

C.

DF bit Clear

D.

MTU ignore

E.

IP MTU

F.

TCP window size

Buy Now
Questions 200

What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?

Options:

A.

real-time threat management to stop DDoS attacks to the core and access networks

B.

real-time awareness of users, devices and traffic on the network

C.

malware control

D.

dynamic threat control for web traffic

Buy Now
Questions 201

In a Cisco SD-WAN solution, how Is the health of a data plane tunnel monitored?

Options:

A.

with IP SLA

B.

ARP probing

C.

using BFD

D.

with OMP

Buy Now
Questions 202

What is required for intercontroller Layer 3 roaming?

Options:

A.

Mobility groups are established between wireless controllers.

B.

The management VLAN is present as a dynamic VLAN on the second WLC.

C.

WLCs use separate DHCP servers.

D.

WLCs have the same IP addresses configured on their interfaces.

Buy Now
Questions 203

Refer to the exhibit.

350-401 Question 203

An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added?

Options:

A.

under the interface

B.

under the flow record

C.

under the flow monitor

D.

under the flow exporter

Buy Now
Questions 204

In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?

Options:

A.

management and data

B.

control and management

C.

control, and forwarding

D.

control and data

Buy Now
Questions 205

Refer to the exhibit.

350-401 Question 205

What step resolves the authentication issue?

Options:

A.

use basic authentication

B.

change the port to 12446

C.

target 192 168 100 82 in the URI

D.

restart the vsmart host

Buy Now
Questions 206

Refer to the exhibit.

350-401 Question 206

What is the result when a switch that is running PVST+ is added to this network?

Options:

A.

DSW2 operates in Rapid PVST+ and the new switch operates in PVST+

B.

Both switches operate in the PVST+ mode

C.

Spanning tree is disabled automatically on the network

D.

Both switches operate in the Rapid PVST+ mode.

Buy Now
Questions 207

Refer the exhibit.

350-401 Question 207

Which router is the designated router on the segment 192.168.0.0/24?

Options:

A.

This segment has no designated router because it is a nonbroadcast network type.

B.

This segment has no designated router because it is a p2p network type.

C.

Router Chicago because it has a lower router ID

D.

Router NewYork because it has a higher router ID

Buy Now
Questions 208

In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?

Options:

A.

VXLAN

B.

IS-IS

C.

802 1Q

D.

CTS

Buy Now
Questions 209

Which Python code snippet must be added to the script to save the returned configuration as a JSON-formatted file?

350-401 Question 209

A)

350-401 Question 209

B)

350-401 Question 209

C)

350-401 Question 209

D)

350-401 Question 209

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 210

Which two parameters are examples of a QoS traffic descriptor? (Choose two)

Options:

A.

MPLS EXP bits

B.

bandwidth

C.

DSCP

D.

ToS

E.

packet size

Buy Now
Questions 211

What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?

Options:

A.

The traffic uses the default MDT to transmit the data only if it isa (S,G) multicast route entry

B.

A data MDT is created to if it is a (*, G) multicast route entries

C.

A data and default MDT are created to flood the multicast stream out of all PIM-SM neighbors.

D.

A data MDT is created to allow for the best transmission through the core for (S, G) multicast route entries.

Buy Now
Questions 212

AN engineer is implementing a route map to support redistribution within BGP. The route map must configured to permit all unmatched routes. Which action must the engineer perform to complete this task?

Options:

A.

Include a permit statement as the first entry

B.

Include at least one explicit deny statement

C.

Remove the implicit deny entry

D.

Include a permit statement as the last entry

Buy Now
Questions 213

What does a northbound API accomplish?

Options:

A.

programmatic control of abstracted network resources through a centralized controller

B.

access to controlled network resources from a centralized node

C.

communication between SDN controllers and physical switches

D.

controlled access to switches from automated security applications

Buy Now
Questions 214

Refer to the exhibit.

350-401 Question 214

The trunk does not work over the back-to-back link between Switch1 interface Giq1/0/20 and Switch2 interface Gig1/0/20. Which configuration fixes the problem?

A)

350-401 Question 214

B)

350-401 Question 214

C)

350-401 Question 214

D)

350-401 Question 214

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 215

An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?

Options:

A.

Router(config)# ip sla responder udp-connect 172.29.139.134 5000

B.

Router(config)# ip sla responder tcp-connect 172.29.139.134 5000

C.

Router(config)# ip sla responder udp-echo 172.29.139.134 5000

D.

Router(config)# ip sla responder tcp-echo 172.29.139.134 5000

Buy Now
Questions 216

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

Options:

A.

logging host 10.2.3.4 vrf mgmt transport tcp port 6514

B.

logging host 10.2.3.4 vrf mgmt transport udp port 6514

C.

logging host 10.2.3.4 vrf mgmt transport tcp port 514

D.

logging host 10.2.3.4 vrf mgmt transport udp port 514

Buy Now
Questions 217

What is one difference between saltstack and ansible?

Options:

A.

SaltStack uses an API proxy agent to program Cisco boxes on agent mode, whereas Ansible uses a Telnet connection

B.

SaltStack uses the Ansible agent on the box, whereas Ansible uses a Telnet server on the box

C.

SaltStack is constructed with minion, whereas Ansible is constructed with YAML

D.

SaltStack uses SSH to interact with Cisco devices, whereas Ansible uses an event bus

Buy Now
Questions 218

What is a characteristics of traffic policing?

Options:

A.

lacks support for marking or remarking

B.

must be applied only to outgoing traffic

C.

can be applied in both traffic directions

D.

queues out-of-profile packets until the buffer is full

Buy Now
Questions 219

Which three resources must the hypervisor make available to the virtual machines? (Choose three)

Options:

A.

memory

B.

bandwidth

C.

IP address

D.

processor

E.

storage

F.

secure access

Buy Now
Questions 220

Which two Cisco SD-WAN components exchange OMP information?

Options:

A.

vAnaiytlcs

B.

vSmart

C.

WAN Edge

D.

vBond

E.

vManage

Buy Now
Questions 221

In a Cisco Catalyst switch equipped with two supervisor modules an administrator must temporally remove the active supervisor from the chassis to perform hardware maintenance on it. Which mechanism ensure that the active supervisor removal is not disruptive to the network operation?

Options:

A.

NSF/NSR

B.

SSO

C.

HSRP

D.

VRRP

Buy Now
Questions 222

Refer to the exhibit.

350-401 Question 222

A network engineer must log in to the router via the console, but the RADIUS servers are not reachable Which credentials allow console access1?

Options:

A.

the username "cisco" and the password "Cisco"

B.

no username and only the password "test123"

C.

no username and only the password "cisco123"

D.

the username "cisco" and the password “cisco123"

Buy Now
Questions 223

An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, WHICH VIRTUAL IP address must be used in this configuration?

Options:

A.

192.0.2.1

B.

172.20.10.1

C.

1.1.1.1

D.

192.168.0.1

Buy Now
Questions 224

Drag and drop the snippets onto the blanks within the code to construct a script that shows all logging that occurred on the appliance from Sunday until 9:00 p.m Thursday Not all options are used.

350-401 Question 224

Options:

Buy Now
Questions 225

350-401 Question 225

Which command must be applied to R2 for an OSPF neighborship to form?

Options:

A.

network 20.1.1.2.0.0.0.0 area 0

B.

network 20.1.1.2 255.255.0.0. area 0

C.

network 20.1.1.2.0.0.255.255 area 0

D.

network 20.1.1.2 255.255.255 area 0

Buy Now
Questions 226

350-401 Question 226

Refer to the exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)

Options:

A.

R1#network 192.168.0.0 mask 255.255.0.0

B.

R2#no network 10.0.0.0 255.255.255.0

C.

R2#network 192.168.0.0 mask 255.255.0.0

D.

R2#network 209.165.201.0 mask 255.255.192.0

E.

R1#no network 10.0.0.0 255.255.255.0

Buy Now
Questions 227

Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?

Options:

A.

least privilege

B.

fail-safe defaults

C.

economy of mechanism

D.

complete mediation

Buy Now
Questions 228

A network engineer is configuring Flexible Netflow and enters these commands

Sampler Netflow1

Mode random one-out-of 100

Interface fastethernet 1/0

Flow-sampler netflow1

Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)

Options:

A.

CPU and memory utilization are reduced.

B.

Only the flows of top 100 talkers are exported

C.

The data export flow is more secure.

D.

The number of packets to be analyzed are reduced

E.

The accuracy of the data to be analyzed is improved

Buy Now
Questions 229

When is an external antenna used inside a building?

Options:

A.

only when using Mobility Express

B.

when it provides the required coverage

C.

only when using 2 4 GHz

D.

only when using 5 GHz

Buy Now
Questions 230

Refer to the exhibit.

350-401 Question 230

A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).

Options:

A.

Create an IPsec profile, associate the transform-set ACL, and apply the profile to the tunnel interface.

B.

Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4.

C.

Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL.

D.

Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.

E.

Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24.

Buy Now
Questions 231

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

Options:

A.

MACsec

B.

IPsec

C.

SSL

D.

Cisco Trustsec

Buy Now
Questions 232

What is the differences between TCAM and the MAC address table?

Options:

A.

The MAC address table is contained in TCAM ACL and QoS information is stored in TCAM

B.

The MAC address table supports partial matches. TCAM requires an exact match

C.

Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.

D.

TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables

Buy Now
Questions 233

350-401 Question 233

Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

Options:

A.

A NETCONF request was made for a data model that does not exist.

B.

The device received a valid NETCONF request and serviced it without error.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

D.

The NETCONF running datastore is currently locked.

Buy Now
Questions 234

350-401 Question 234

Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verity the configuration What does the output confirm?

Options:

A.

The first pocket triggered NAT to add on entry to NAT table

B.

R1 is configured with NAT overload parameters

C.

A Telnet from 160.1.1 1 to 10.1.1.10 has been initiated.

D.

R1 to configured with PAT overload parameters

Buy Now
Questions 235

An engineer must configure an ACL that permits packets which include an ACK in the TCP header Which entry must be included in the ACL?

Options:

A.

access-list 10 permit ip any any eq 21 tcp-ack

B.

access-list 110 permit tcp any any eq 21 tcp-ack

C.

access-list 10 permit tcp any any eq 21 established

D.

access-list 110 permit tcp any any eq 21 established

Buy Now
Questions 236

Refer to the exhibit.

350-401 Question 236

Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?

A)

350-401 Question 236

B)

350-401 Question 236

C)

350-401 Question 236

D)

350-401 Question 236

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 237

Which VXLAN component is used to encapsulate and decapsulate Ethernet frames?

Options:

A.

VNI

B.

GRE

C.

VTEP

D.

EVPN

Buy Now
Questions 238

Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

350-401 Question 238

Options:

Buy Now
Questions 239

Which definition describes JWT in regard to REST API security?

Options:

A.

an encrypted JSON token that is used for authentication

B.

an encrypted JSON token that is used for authorization

C.

an encoded JSON token that is used to securely exchange information

D.

an encoded JSON token that is used for authentication

Buy Now
Questions 240

Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?

Options:

A.

Authentication Down/Switching Down

B.

Authentication-Central/Switch-Local

C.

Authentication- Down/Switch-Local

D.

Authentication-Central/Switch-Central

Buy Now
Questions 241

Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (choose two)

Options:

A.

network data platform

B.

network underlay

C.

fabric overlay

D.

network control platform

E.

partner ecosystem

Buy Now
Questions 242

Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?

350-401 Question 242

A)

350-401 Question 242

B)

350-401 Question 242

C)

350-401 Question 242

D)

350-401 Question 242

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 243

350-401 Question 243

Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?

Options:

A.

The ping command must be executed in the global routing table.

B.

Interface FastEthernet0/0 Is configured in VRF CUST-A, so the ARP entry is also in that VRF.

C.

When VRFs are used. ARP protocol must be enabled In each VRF.

D.

When VRFs are used. ARP protocol is disabled in the global routing table.

Buy Now
Questions 244

Refer to the exhibit .

350-401 Question 244

Which command must be configured for RESTCONF to operate on port 8888?

Options:

A.

ip http port 8888

B.

restconf port 8888

C.

ip http restconf port 8888

D.

restconf http port 8888

Buy Now
Questions 245

What is a characteristic of a type 2 hypervisor?

Options:

A.

ideal for data center

B.

complicated deployment

C.

ideal for client/end-user system

D.

referred to as bare-metal

Buy Now
Questions 246

Which method displays text directly into the active console with a synchronous EEM applet policy?

Options:

A.

event manager applet boom

event syslog pattern 'UP'

action 1.0 gets 'logging directly to console'

B.

event manager applet boom

event syslog pattern 'UP'

action 1.0 syslog priority direct msg 'log directly to console'

C.

event manager applet boom

event syslog pattern 'UP'

action 1.0 puts 'logging directly to console'

D.

event manager applet boom

event syslog pattern 'UP'

action 1.0 string 'logging directly to console'

Buy Now
Questions 247

Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?

Options:

A.

43

B.

52

C.

60

D.

82

Buy Now
Questions 248

How does NETCONF YANG represent data structures?

Options:

A.

as strict data structures denned by RFC 6020

B.

in an XML tree format

C.

in an HTML format

D.

as modules within a tree

Buy Now
Questions 249

Refer to the exhibit.

350-401 Question 249

An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection, however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?

Options:

A.

Allow all VLANs on the trunk links

B.

Disable Spanning Tree for the native VLAN.

C.

Configure the correct native VLAN on the remote interface

D.

Change both interfaces to access ports.

Buy Now
Questions 250

350-401 Question 250

Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?

A)

350-401 Question 250

B)

350-401 Question 250

C)

350-401 Question 250

D)

350-401 Question 250

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 251

What is a characteristic of a Type I hypervisor?

Options:

A.

It is installed on an operating system and supports other operating systems above it.

B.

It is referred to as a hosted hypervisor.

C.

Problems in the base operating system can affect the entire system.

D.

It is completely independent of the operating system.

Buy Now
Questions 252

350-401 Question 252

Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?

Options:

A.

ip sla schedule 100 start-time now life forever

B.

ip sla schedule 30 start-time now life forever

C.

ip sla schedule 100 start-time now life 30

D.

ip sla schedule 100 life forever

Buy Now
Exam Code: 350-401
Exam Name: Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)
Last Update: Apr 26, 2024
Questions: 913

PDF + Testing Engine

$70  $174.99

Testing Engine

$54  $134.99
buy now 350-401 testing engine

PDF (Q&A)

$48  $119.99
buy now 350-401 pdf