Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Cisco 350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Exam Practice Test

Page: 1 / 19
Total 188 questions

Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36  $119.99
Question 1

At which plane does vBond operate in Cisco SD-WAN solutions?

Options:

A.

control plane

B.

data plane

C.

orchestration plane

D.

management plane

Question 2

A script contains the statement white loop != 999 ’ Which value terminates the loop?

Options:

A.

A value equal to 999.

B.

A value not equal to 999.

C.

A value greater than or equal to 999.

D.

A value less than or equal to 999.

Question 3

Which tool functions in a push model, supports languages like Python or Ruby, and does not require an agent to be installed per host?

Options:

A.

Puppet

B.

Ansible

C.

Saltstack

D.

Chef

Question 4

Refer to the exhibit. A POST /discovery request spawns an asynchronous task. After querying for more information about the task, the Cisco DNA Center platform returns the REST API response. What is the status of the discovery task?

Options:

A.

restarted

B.

failed

C.

stopped

D.

successful

Question 5

An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:

    Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.

    After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.

The contents of the JSON-formatted file are as follows

Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.

Options:

Question 6

Drag and drop the code snippets from the bottom onto the blanks in the Python script to print the device model to the screen and write JSON data to a file. Not all options are used

Options:

Question 7

What is YANG used for?

Options:

A.

scraping data via CLI

B.

processing SNMP read-only polls

C.

describing data models

D.

prowling a transport for network configuration data between client and server

Question 8

Which Cisco Catalyst SD-WAN component is responsible for distributing data plane traffic policies?

Options:

A.

vBond

B.

vManage

C.

vSmart

D.

WAN edge

Question 9

Refer to the exhibit An engineer is troubleshooting an issue with non-Wi-Fi interference on the 5-GHz band The engineer has enabled Cisco CleanAir and set the appropriate traps, but the AP does not change the channel when it detects significant interference Which action will resolve the issue?

Options:

A.

Enable the Avoid Persistent Non-WiFi Interference option

B.

Disable the Avoid Foreign AP Interference option.

C.

Change the DCA Sensitivity option to High

D.

Enable the Event Driven Radio Resource Management option

Question 10

Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.

Options:

Question 11

What is two characteristic of Cisco DNA Center and vManage northbound APIs?

Options:

A.

They exchange XML-formatted content

B.

They exchange JSON-kxmatted content.

C.

They implement the RESTCONF protocol.

D.

They implement the NETCONF protocol.

E.

They exchange protobuf-formatted content.

Question 12

In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)

Options:

A.

advertisement of network prefixes and their attributes

B.

configuration of control and data policies

C.

gathering of underlay infrastructure data

D.

delivery of crypto keys

E.

segmentation and differentiation of traffic

Question 13

A company hires a network architect to design a new OTT wireless solution within a Cisco SD-Access Fabric wired network. The architect wants to register access points to the WLC to centrally switch the traffic. Which AP mode must the design include?

Options:

A.

Bridge

B.

Fabric

C.

FlexConnect

D.

local

Question 14

A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violates Which term refers to this REST security design principle?

Options:

A.

economy of mechanism

B.

complete mediation

C.

separation of privilege

D.

least common mechanism

Question 15

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

•LocationA -72dBm

• Location B:-75 dBm

• Location C; -65 dBm

• Location D -80 dBm

Which two statements does the engineer use to explain these values to the customer? (Choose two.)

Options:

A.

The signal strength at location B is 10 dB better than location C.

B.

The signal strength at location C is too weak to support web surfing

C.

Location D has the strongest RF signal strength.

D.

The RF signal strength at location B is 50% weaker than location A.

E.

The RF signal strength at location C is 10 times stronger than location B

Question 16

Refer to the exhibit.

What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

Options:

A.

A NETCONF request was made for a data model that does not exist.

B.

The device received a valid NETCONF request and serviced it without error.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

D.

The NETCONF running datastore is currently locked.

Question 17

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?

Options:

A.

EIRP

B.

mW

C.

dBm

D.

dBi

Question 18

Which framework is used for third-party authorization?

Options:

A.

API keys

B.

custom tokens

C.

OAuth

D.

SOAP

Question 19

What is a characteristics of a type 1 hypervisor?

Options:

A.

It runs on top of the host operating system.

B.

It is preferred for supporting nonproduction workloads.

C.

It has greater latency than a Type 2 hypervisor.

D.

It runs on top of bare metal servers.

Question 20

Refer to lhe exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF-capable Cisco IOS XE device that Is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 21

What is one characteristic of an AP that is operating in Mobility Express mode?

Options:

A.

It is recommended for large scale deployments.

B.

It requires a centralized WLC.

C.

At least three APs are needed for WLC redundancy.

D.

It requires an AP to act as a WLC.

Question 22

What is used to measure the total output energy of a Wi-Fi device?

Options:

A.

dBi

B.

EIRP

C.

mW

D.

dBm

Question 23

A corporate policy mandates that a certificate-based authentication system must be implemented on the wireless infrastructure. All corporate clients will contain a certificate that will be used in conjunction with ISE and user credentials to perform authentication before the clients are allowed to connect to the corporate Wi-Fi. Which authentication key option must be selected to ensure that this authentication can take place?

Options:

A.

none

B.

PSK

C.

802.1x

D.

CCKM

Question 24

Which two functions is an edge node responsible for? (Choose two.)

Options:

A.

provides multiple entry and exit points for fabric traffic

B.

provides the default exit point for fabric traffic

C.

provides the default entry point for fabric traffic

D.

provides a host database that maps endpoint IDs to a current location

E.

authenticates endpoints

Question 25

What is the purpose of data modeling languages?

Options:

A.

to describe a data schema convertible into any data encoding format

B.

to specify algorithms necessary to decode binary-encoded protocol data units

C.

to translate encoded data for interoperability between different CPU architectures

D.

to provide a framework to describe data flow patterns in networks

Question 26

In a wireless network environment, which measurement compares the received signal to the background noise?

Options:

A.

free space path loss

B.

link power budget

C.

fading

D.

SNR

Question 27

In a Cisco SD-Access network architecture, which access layer cabling design is optimal for the underlay network?

Options:

A.

Switches are cross-finned at the same layer and have a single connection to each upstream distribution device

B.

Switches are connected to each upstream distribution and core device.

C.

Switches are connected to each upstream distribution device.

D.

Switches are cross-linked to devices at the same layer and at the upstream and downstream devices.

Question 28

Drag and drop the characteristics of Cisco Catalyst SD-WAN from the left onto the right. Not all options are used.

Options:

Question 29

Options:

Question 30

Options:

Question 31

Options:

Question 32

Options:

Question 33

Options:

Question 34

Options:

Question 35

Options:

Question 36

Options:

Question 37

Options:

Question 38

Options:

Question 39

Options:

Question 40

Options:

Question 41

OR

Options:

Question 42

Options:

Question 43

Options:

Question 44

Options:

Question 45

Options:

Question 46

Options:

Question 47

Options:

Question 48

Options:

Question 49

Options:

Question 50

Options:

Question 51

Options:

Question 52

Options:

Question 53

Options:

Question 54

Options:

Page: 1 / 19
Total 188 questions