Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Questions 4

Options:

Buy Now
Questions 5

Options:

Buy Now
Questions 6

Options:

Buy Now
Questions 7

Options:

Buy Now
Questions 8

Options:

Buy Now
Questions 9

Options:

Buy Now
Questions 10

Options:

Buy Now
Questions 11

Options:

Buy Now
Questions 12

Options:

Buy Now
Questions 13

Options:

Buy Now
Questions 14

Options:

Buy Now
Questions 15

OR

Options:

Buy Now
Questions 16

Options:

Buy Now
Questions 17

Options:

Buy Now
Questions 18

Options:

Buy Now
Questions 19

Options:

Buy Now
Questions 20

Options:

Buy Now
Questions 21

Options:

Buy Now
Questions 22

Options:

Buy Now
Questions 23

Options:

Buy Now
Questions 24

Options:

Buy Now
Questions 25

Options:

Buy Now
Questions 26

At which plane does vBond operate in Cisco SD-WAN solutions?

Options:

A.

control plane

B.

data plane

C.

orchestration plane

D.

management plane

Buy Now
Questions 27

Refer to the exibit. How should the programmer access the list of VLANs that are recevied via the API call?

Options:

A.

VlanNames(0)

B.

VlanName[Vlan1']

C.

VlanName['response']

D.

list(VlanNames)

Buy Now
Questions 28

Options:

Buy Now
Questions 29

Refer to the exhibit. An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required?

Options:

A.

Enable EAP parameters.

B.

Apply CISCO ISE default settings.

C.

Disable the RADIUS server accounting interim update.

D.

Select a RADIUS authentication server.

Buy Now
Questions 30

Options:

Buy Now
Questions 31

Refer to the exhibit. Running the script causes the output in the exhibit. What should be the first line of the script?

Options:

A.

import manager

B.

ncclient manager import

C.

from ncclient import *

D.

from ncclient import manager

Buy Now
Questions 32

Options:

Buy Now
Questions 33

Options:

Buy Now
Questions 34

Which solution should be used in a high-density wireless environment to increase bandwidth for each user?

Options:

A.

Increase antenna size.

B.

Increase the cell size of each AP.

C.

Increase the mandatory minimum data rate.

D.

Increase TX power.

Buy Now
Questions 35

Which DNS record type is needed to allow a Cisco AP to discover a WLC when using IPv4?

Options:

A.

CNAME record

B.

A record

C.

NS record

D.

SOA record

Buy Now
Questions 36

When using a Cisco Catalyst 9800 Series WLC, which tag/profile can be applied to APs to change the mode to FlexConnect in a specific location?

Options:

A.

policy tag

B.

site tag

C.

AP join profile

D.

flex profile

Buy Now
Questions 37

Refer to the exhibit. Drag and drop the snippets into the RESTCONF request to form the request that returns this response. Not all options are used.

Options:

Buy Now
Questions 38

Which technology is the Cisco SD-Access control plane based on?

Options:

A.

LISP

B.

CTS

C.

SGT

D.

VRF

Buy Now
Questions 39

Which deployment option of Cisco NGFW provides scalability?

Options:

A.

tap

B.

inline tap

C.

high availability

D.

clustering

Buy Now
Questions 40

An engineer is implementing a new SSID on a Cisco Catalyst 9800 Series WLC that must be broadcast on 6 GHz radios. Users will be required to use EAP-TLS to authenticate. Which wireless Layer 2 security method is required?

Options:

A.

WPA3 Personal

B.

WPA3 Enterprise

C.

WPA3 Enterprise

D.

WPA2 Personal

Buy Now
Questions 41

What is a characteristic of a Type 2 hypervisor?

Options:

A.

quick deployment

B.

ideal for data center

C.

complicated deployment

D.

referred to as bare-metal

Buy Now
Questions 42

Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.

Options:

Buy Now
Questions 43

What is a characteristic of MACsec?

Options:

A.

8021AE provides encryption and authentication services

B.

8021AE is butt between the host and switch using the MKA protocol which negotiates encryption keys based on the master session key from a successful 802IX session

C.

802.1AE is built between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)

D.

8021AE is negotiated using Cisco AnyConnect NAM and the SAP protocol

Buy Now
Questions 44

Refer to the exhibit.

Which action must be taken to configure a WLAN for WPA2-AES with PSK and allow only 802.11r-capable clients to connect?

Options:

A.

Enable PSK and FT + PSK.

B.

Enable Fast Transition and FT + PSK.

C.

Enable Fast Transition and PSK.

D.

Change Fast Transition to Adaptive Enabled and enable FT * PSK.

Buy Now
Questions 45

A customer has two Cisco WLCs that manage separate APs throughout a building. Each WLC advertises the same SSID but terminates on different interfaces. Users report that they drop their connections and change IP addresses when roaming. Which action resolves this issue?

Options:

A.

Enable client load balancing

B.

Enable fast roaming.

C.

Configure high availability.

D.

Configure mobility groups.

Buy Now
Questions 46

Drag and drop the automation characteristics from the left to the corresponding tools on the right.

Options:

Buy Now
Questions 47

Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two.)

Options:

A.

custom headers

B.

authentication

C.

authorization

D.

request management

E.

accounting

Buy Now
Questions 48

Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 49

Refer to the exhibit.

A client requests a new SSID that will use web-based authentication and external RADIUS servers. Which Layer 2 security mode must be selected?

Options:

A.

Static WEP

B.

WPA2 + WPA3

C.

None

D.

WPA + WPA2

Buy Now
Questions 50

Refer to the exhibit. An engineer must adjust the configuration so that Router A becomes the active router. Which commands should be applied to router A? (Choose two)

Options:

A.

vrrp 1 priority 90

B.

vrrp 1 timers advertise 1

C.

vrrp lip 10.1.0.11

D.

ip address 10.1.0.11 255.0.0.0

E.

vrrp 1 priority 120

Buy Now
Questions 51

Drag and drop the characteristics from the left onto the corresponding orchestration tool on the right.

Options:

Buy Now
Questions 52

What is a benefit of data modeling languages like YANG?

Options:

A.

They enable programmers to change or write their own application within the device operating system.

B.

They create more secure and efficient SNMP OIDs.

C.

They make the CLI simpler and more efficient.

D.

They provide a standardized data structure, which results in configuration scalability and consistency.

Buy Now
Questions 53

What occurs during a Layer 2 inter-controller roam?

Options:

A.

A new security context is applied for each controller to which the client is associated, but the IP address remains the same.

B.

The client must be associated to a new controller where a new IP address and security context are applied.

C.

The client retains the same IP address and security context.

D.

The client is marked as foreign in the database of each new controller to which it is connected.

Buy Now
Questions 54

Which language defines the structure or modeling of data for NETCONF and RESTCONF?

Options:

A.

YAML

B.

YANG

C.

JSON

D.

XML

Buy Now
Questions 55

Which First Hop Redundancy Protocol should be used to meet a design requirements for more efficient default bandwidth usage across multiple devices?

Options:

A.

GLBP

B.

LCAP

C.

HSRP

D.

VRRP

Buy Now
Questions 56

Refer to the exhibit.

Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 57

Which task Is mandatory when provisioning a device through the plug-and-play workflow in Cisco DNA Center?

Options:

A.

site assignment

B.

slack serial number assignment

C.

golden image upgrade

D.

template configuration application

Buy Now
Questions 58

How do FHRPs differ from SSO?

Options:

A.

FHRPs provide gateway redundancy, and SSO provides failover within a single device

B.

FHRPs maintain state information within a single device, and SSO manages state information across multiple devices.

C.

FHRPs use OTV for redundancy, and SSO uses VXLAN for state synchronization.

D.

FHRPs influence bandwidth allocation, and SSO influences routing decisions.

Buy Now
Questions 59

What is the recommended minimum SNR for Voice applications for networks?

Options:

A.

15

B.

20

C.

25

D.

10

Buy Now
Questions 60

Refer to the exhibit. How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 61

In a high-density AP environment, which feature can be used to reduce the RF cell size and not demodulate radio packets above a given threshold?

Options:

A.

RX-SOP

B.

FRA

C.

80211k

D.

RRM

Buy Now
Questions 62

Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?

Options:

A.

All devices integrating with ISE

B.

selected individual devices

C.

all devices in selected sites

D.

all wired devices

Buy Now
Questions 63

What is one characteristic of Cisco DNA Center and vManage northbound APIs?

Options:

A.

They push configuration changes down to devices.

B.

They implement the RESTCONF protocol.

C.

They exchange XML-formatted content.

D.

They implement the NETCONF protocol.

Buy Now
Questions 64

What is the name of the numerical relationship of the wireless signal compared to the noise floor?

Options:

A.

SNR

B.

RSSI

C.

EIRP

D.

gain

Buy Now
Questions 65

Which technology collects location information through data packets received by the APs instead of using mobile device probes?

Options:

A.

detect and locate

B.

FastLocate

C.

hyperlocation

D.

RF fingerprinting

Buy Now
Questions 66

Which feature is offered by the Cisco Advanced Malware Protection for Endpoints solution?

Options:

A.

DNS Protection

B.

NetFlow

C.

Trustsec

D.

File Sandboxing

Buy Now
Questions 67

Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity?

Options:

A.

802. 1d

B.

802.1x

C.

802.1q

D.

802.1w

Buy Now
Questions 68

What are two characteristics of a directional antenna? (Choose two.)

Options:

A.

high gain

B.

receive signals equally from all directions

C.

commonly used to cover large areas

D.

provides the most focused and narrow beam width

E.

low gain

Buy Now
Questions 69

Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session?

Options:

A.

HTTP Status Code 200

B.

HTTP Status Code 302

C.

HTTP Status Code 401

D.

HTTP Status Code: 504

Buy Now
Questions 70

Which method does FastLocate use to collect location-based information?

Options:

A.

RFID

B.

client probing

C.

beacons

D.

data packets

Buy Now
Questions 71

Refer to the exhibit.

An engineer attempts to connect to another device from Route1’s console port. Which configuration is needed to allow telnet connections?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 72

In a virtual environment, what is a VMDK file?

Options:

A.

A file containing information about snapshots of a virtual machine.

B.

A zip file connecting a virtual machine configuration file and a virtual disk.

C.

A configuration file containing settings for a virtual machine such as a guest OS.

D.

A file containing a virtual machine disk drive.

Buy Now
Questions 73

What is a benefit of implementing stateful switchover?

Options:

A.

modularity

B.

resiliency

C.

flexibility

D scalability

Buy Now
Questions 74

Which feature works with SSO to continue forwarding packets after a route processor failure until the control plane recovers?

Options:

A.

ECMP

B.

HSRP

C.

RSVP

D.

NSF

Buy Now
Questions 75

What is the function of the statement "import actions" in this script?

Options:

A.

It imports the functions that are not available natively in Python

B.

It imports the functions of a third-party module

C.

It imports a Python module

D.

It imports an external reference

Buy Now
Questions 76

An engineer must configure a new WLAN that supports 802.11r and requires users to enter a passphrase. What must be configured to support this requirement?

Options:

A.

802.1XandSUITEB-1X

B.

FT PSK and Fast Transition

C.

802.1X and Fast Transition

D.

FTPSKandSUITEB-1X

Buy Now
Questions 77

An engineer is installing a new pair of routers in a redundant configuration. Which protocol ensures that traffic is not disrupted in the event of a hardware failure?

Options:

A.

HSRPv1

B.

GLBP

C.

VRRP

D.

HSRPv2

Buy Now
Questions 78

What is the role of the vSmart controller in a Cisco Catalyst SD-WAN environment?

Options:

A.

It is the centralized network management system.

B.

It manages the data plane.

C.

It manages the control plane.

D.

It performs authentication and authorization.

Buy Now
Questions 79

Which multicast operational mode sends a prune message to the source when there are no connected members or downstream neighbors?

Options:

A.

PIM sparse mode

B.

PIM dense mode

C.

IGMPv3

D.

IGMPv2

Buy Now
Questions 80

Which two namespaces does the LISP network architecture and protocol use? (Choose two.)

Options:

A.

TLOC

B.

RLOC

C.

DNS

D.

VTEP

E.

EID

Buy Now
Questions 81

Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.

Options:

Buy Now
Questions 82

Refer to the exhibit. Authentication for users must first use RADIUS, and fall back to the local database on the router if the RADIUS server is unavailable Which two configuration sets are needed to achieve this result? (Choose two.)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 83

Which two protocols are used with YANG data models? (Choose two.)

Options:

A.

NETCONF

B.

RESTCONF

C.

SSH

D.

TLS

E.

HTTPS

Buy Now
Questions 84

Which two operational modes enable an AP to scan one or more wireless channels for rogue access points and at the same time provide wireless services to clients? (Choose two.)

Options:

A.

local

B.

rogue detector

C.

monitor

D.

FlexConnect

E.

sniffer

Buy Now
Questions 85

What is one primary REST security design principle?

Options:

A.

fail-safe defaults

B.

password hash

C.

adding a timestamp in requests

D.

OAuth

Buy Now
Questions 86

How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?

Options:

A.

Add a timestamp to the request in the API header.

B.

Use a password hash.

C.

Add OAuth to the request in the API header.

D.

Use HTTPS.

Buy Now
Questions 87

Which function is performed by vSmart in the Cisco Catalyst SD-WAN architecture?

Options:

A.

facilitation of NAT detection and traversal

B.

redistribution between OMP and other routing protocols

C.

distribution of IPsec keys

D.

execution of localized policies

Buy Now
Questions 88

What is a benefit of Cisco TrustSec in a multilayered LAN network design?

Options:

A.

Policy can be applied on a hop-by-hop basis.

B.

There is no requirement to run IEEE 802.1X when TrustSec is enabled on a switch port

C.

Application flows between hosts on the LAN to remote destinations can be encrypted.

D.

Policy or ACLs are not required.

Buy Now
Exam Code: 350-401
Exam Name: Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)
Last Update: Apr 7, 2026
Questions: 393
350-401 pdf

350-401 PDF

$28.5  $94.99
350-401 Engine

350-401 Testing Engine

$33  $109.99
350-401 PDF + Engine

350-401 PDF + Testing Engine

$43.5  $144.99