Weekend Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Enterprise > 350-401

350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Question and Answers

Question # 4

What is the API keys option for REST API authentication?

A.

a credential that is transmitted unencrypted

B.

one-time encrypted token

C.

a username that is stored in the local router

D.

a predetermined string that is passed from client to server.

Full Access
Question # 5

A script contains the statement white loop != 999 ’ Which value terminates the loop?

A.

A value equal to 999.

B.

A value not equal to 999.

C.

A value greater than or equal to 999.

D.

A value less than or equal to 999.

Full Access
Question # 6

How does Cisco DNA Center perform a network discovery?

A.

using SNMP

B.

using ICMP

C.

through a DHCP server

D.

using CDP with a seed IP address

Full Access
Question # 7

Refer to the exhibit.

An engineer attempts to connect to another device from Route1’s console port. Which configuration is needed to allow telnet connections?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 8

In a wireless network environment, which measurement compares the received signal to the background noise?

A.

free space path loss

B.

link power budget

C.

fading

D.

SNR

Full Access
Question # 9

Which AP mode allows administrators to generate pcap files to use for troubleshooting?

A.

Sniffer

B.

Local

C.

H-REAP

D.

Monitor

Full Access
Question # 10

Drag and drop the snippets onto the blanks within the code to create an EEM script that adds an entry to a locally stored text file with a timestamp when a configuration change is made. Not all options are used.

Full Access
Question # 11

What is the data policy in a Cisco SD-WAN deployment?

A.

list of ordered statements that define node configurations and authentication used within the SD-WAN overlay

B.

set of statements that defines how data is forwarded based on IP pocket information and specific VPNs

C.

detailed database mapping several kinds of addresses with their corresponding location

D.

group of services tested to guarantee devices and links liveliness within the SD-WAN overlay

Full Access
Question # 12

Refer to the exhibit. A POST /discovery request spawns an asynchronous task. After querying for more information about the task, the Cisco DNA Center platform returns the REST API response. What is the status of the discovery task?

A.

restarted

B.

failed

C.

stopped

D.

successful

Full Access
Question # 13

In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)

A.

advertisement of network prefixes and their attributes

B.

configuration of control and data policies

C.

gathering of underlay infrastructure data

D.

delivery of crypto keys

E.

segmentation and differentiation of traffic

Full Access
Question # 14

Refer to the exhibit.

What does the snippet of code achieve?

A.

It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

B.

It opens a tunnel and encapsulates the login information, if the host key is correct.

C.

It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

D.

It creates an SSH connection using the SSH key that is stored, and the password is ignored.

Full Access
Question # 15

What is used by vManage to interact with Cisco SD-WAN devices in the fabric?

A.

northbound API

B.

RESTCONF

C.

Southbound API

D.

IPsec

Full Access
Question # 16

What is one characteristic of Cisco SD-Access networks?

A.

Devices are assigned to virtual networks based on their VLAN membership.

B.

Scalable group tags are used for macrosegmentatlon.

C.

Virtual networks are used for microsegmentation.

D.

All traffic is Layer 3 within the fabric.

Full Access
Question # 17

In Cisco Catalyst Center (formerly DNA Center) Inventory, the Software Version of a network device displays a status of OUTDATED. What does It me?

A.

There is a later software version available on Cisco Catalyst Center (formerly DNA Center).

B.

The current software image does not match the selected Golden image for this type of network device.

C.

The current type of software image does not match the type of the network device.

D.

There is a later software version available at www.cisco.com website.

Full Access
Question # 18

Refer to the exhibit.

What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

A.

A NETCONF request was made for a data model that does not exist.

B.

The device received a valid NETCONF request and serviced it without error.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

D.

The NETCONF running datastore is currently locked.

Full Access
Question # 19

Drag and drop the characteristics of Cisco Catalyst SD-WAN from the left onto the right. Not all options are used.

Full Access
Question # 20

Which lag/profile on a Cisco Catalyst 9800 Series WLC must be modified to allow Cisco ISE to dynamically assign VLANs to users on an 802.1X-based SSID?

A.

interface lag

B.

site tag

C.

WLAN profile

D.

policy profile

Full Access
Question # 21

How does SSO work with HSRP to minimize network disruptions?

A.

It enables HSRP to elect another switch in the group as the active HSRP switch.

B.

It ensures fast failover in the case of link failure.

C.

It enables data forwarding along known routes following a switchover, white the routing protocol reconverges.

D.

It enables HSRP to failover to the standby RP on the same device.

Full Access
Question # 22

What is used to measure the total output energy of a Wi-Fi device?

A.

dBi

B.

EIRP

C.

mW

D.

dBm

Full Access
Question # 23

Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two.)

A.

modular QoS

B.

policy routing

C.

web authentication

D.

DHCP

E.

IEEE 802.1x

Full Access
Question # 24

Which two operations are valid for RESTCONF? (Choose two)

A.

PULL

B.

ADD

C.

HEAD

D.

REMOVE

E.

GET

F.

PUSH

Full Access
Question # 25

Which feature is available to clients using layer 2 roaming in a wireless infrastructure?

A.

Room to a different wireless controller that is on o different subnet and maintain the same IP address

B.

Associate to a new access point on a different wireless controller and change the IP address without connectivity interruption

C.

Associate to a new access point on the same wireless controller and change the IP address without connectivity interruption

D.

Roam to a different wireless controller that snares The same subnet and maintain the same IP address

Full Access
Question # 26

A customer requires their wireless data traffic to egress at the switch port of the access point. Which access point mode supports this?

A.

Bridge

B.

Sniffer

C.

FlexConnect

D.

Monitor

Full Access
Question # 27

A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violates Which term refers to this REST security design principle?

A.

economy of mechanism

B.

complete mediation

C.

separation of privilege

D.

least common mechanism

Full Access
Question # 28

Full Access
Question # 29

Refer to the exhibit. What is the output of this code?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 30

Full Access
Question # 31

Full Access
Question # 32

OR

Full Access
Question # 33

Full Access
Question # 34

Full Access
Question # 35

Full Access
Question # 36

Full Access
Question # 37

Full Access
Question # 38

Full Access
Question # 39

Full Access
Question # 40

Full Access
Question # 41

Full Access
Question # 42

Full Access
Question # 43

Full Access
Question # 44

Full Access
Question # 45

Full Access
Question # 46

Full Access
Question # 47

Full Access
Question # 48

Full Access
Question # 49

Full Access
Question # 50

Full Access
Question # 51

Full Access
Question # 52

Full Access
Question # 53

Full Access
Question # 54

Full Access
Question # 55

Full Access
Question # 56

Full Access