Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Questions 4

Options:

Buy Now
Questions 5

Options:

Buy Now
Questions 6

Options:

Buy Now
Questions 7

Options:

Buy Now
Questions 8

Options:

Buy Now
Questions 9

Options:

Buy Now
Questions 10

Options:

Buy Now
Questions 11

Options:

Buy Now
Questions 12

Options:

Buy Now
Questions 13

Options:

Buy Now
Questions 14

Options:

Buy Now
Questions 15

Options:

Buy Now
Questions 16

Options:

Buy Now
Questions 17

OR

Options:

Buy Now
Questions 18

Options:

Buy Now
Questions 19

Options:

Buy Now
Questions 20

Options:

Buy Now
Questions 21

Options:

Buy Now
Questions 22

Options:

Buy Now
Questions 23

Options:

Buy Now
Questions 24

Options:

Buy Now
Questions 25

Options:

Buy Now
Questions 26

Options:

Buy Now
Questions 27

Options:

Buy Now
Questions 28

Options:

Buy Now
Questions 29

Options:

Buy Now
Questions 30

Drag and drop the Cisco Catalyst Center (formerly DNA Center) southbound API characteristics from the left to the right. Not all options are used.

Options:

Buy Now
Questions 31

Which controller is the single plane of management for Cisco SD-WAN?

Options:

A.

vBond

B.

vEdge

C.

vSmart

D.

vManage

Buy Now
Questions 32

What is the data policy in a Cisco SD-WAN deployment?

Options:

A.

list of ordered statements that define node configurations and authentication used within the SD-WAN overlay

B.

set of statements that defines how data is forwarded based on IP pocket information and specific VPNs

C.

detailed database mapping several kinds of addresses with their corresponding location

D.

group of services tested to guarantee devices and links liveliness within the SD-WAN overlay

Buy Now
Questions 33

Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity?

Options:

A.

802. 1d

B.

802.1x

C.

802.1q

D.

802.1w

Buy Now
Questions 34

What are two device roles in Cisco SD-Access fabric? (Choose two.)

Options:

A.

core switch

B.

vBond controller

C.

edge node

D.

access switch

E.

border node

Buy Now
Questions 35

Which NGFW mode block flows crossing the firewall?

Options:

A.

Passive

B.

Tap

C.

Inline tap

D.

Inline

Buy Now
Questions 36

Exhibit.

Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?

Options:

A.

line vty 0 15

absolute-timeout 600

B.

line vty 0 15

exec-timeout

C.

line vty 01 5

exec-timeout 10 0

D.

line vty 0 4

exec-timeout 600

Buy Now
Questions 37

What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?

Options:

A.

SSH

B.

TLS

C.

HTTPS

D.

JWT

Buy Now
Questions 38

Which feature provides data-plane security for Cisco Catalyst SD-WAN networks'?

Options:

A.

IPsec

B.

SSH

C.

IPS

D.

TLS/DTLS

Buy Now
Questions 39

What is the API keys option for REST API authentication?

Options:

A.

a credential that is transmitted unencrypted

B.

one-time encrypted token

C.

a username that is stored in the local router

D.

a predetermined string that is passed from client to server.

Buy Now
Questions 40

Which DNS record type is needed to allow a Cisco AP to discover a WLC when using IPv4?

Options:

A.

CNAME record

B.

A record

C.

NS record

D.

SOA record

Buy Now
Questions 41

Refer to the exhibit. An engineer builds an EEM script to apply an access list. Which statement must be added to complete the script?

Options:

A.

event none

B.

action 6.0 cli command "ip access-list extended 101"

C.

action 2.1 cli command "ip access-list extended 101"

D.

action 3.1 cli command "ip access-list extended 101"

Buy Now
Questions 42

Which two pieces of information are necessary to compute SNR? (Choose two.)

Options:

A.

EIRP

B.

noise floor

C.

antenna gain

D.

RSSI

E.

transmit power

Buy Now
Questions 43

Which two southbound interfaces originate from Cisco Catalyst Center (formerly DNA Center) and terminate at fabric underlay switches'? (Choose two.)

Options:

A.

ICMP Discovery

B.

UDP67 DHCP

C.

TCP 23 Telnet

D.

UDP6007 NetFlow

E.

UDP 162 SNMP

Buy Now
Questions 44

Which consideration must be made when using BFD in a network design?

Options:

A.

BFD requires a FHRP in order to provide sub second host failover.

B.

BFD can be deployed without any IP routing protocols being configured.

C.

NSF and graceful restart must be enabled on all participating routers.

D.

Cisco Express forwarding and IP routing must be enabled on all participating routers.

Buy Now
Questions 45

What is one method for achieving REST API security?

Options:

A.

using a MD5 hash to verify the integrity

B.

using built-in protocols known as Web Services Security

C.

using HTTPS and TLS encryption

D.

using a combination of XML encryption and XML signatures

Buy Now
Questions 46

Which two actions are recommended as security best practices to protect REST API? (Choose two.)

Options:

A.

Use SSL for encryption.

B.

Enable out-of-band authentication.

C.

Enable dual authentication of the session.

D.

Use TACACS+ authentication.

E.

Use a password hash.

Buy Now
Questions 47

Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used.

Options:

Buy Now
Questions 48

Which Cisco WLC feature allows a wireless device to perform a Layer 3 roam between two separate controllers without changing the client IP address?

Options:

A.

mobile IP

B.

mobility tunnel

C.

LWAPP tunnel

D.

GRE tunnel

Buy Now
Questions 49

Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?

Options:

A.

event manager applet ondemand

event register

action 1.0 syslog priority critical msg 'This is a message from ondemand'

B.

event manager applet ondemand

event manual

action 1.0 syslog priority critical msg 'This is a message from ondemand'

C.

event manager applet ondemand

event none

action 1.0 syslog priority critical msg 'This is a message from ondemand'

D.

event manager applet ondemand

action 1.0 syslog priority critical msg 'This is a message from ondemand'

Buy Now
Questions 50

On which protocol or technology is the fabric data plane based in Cisco SD-Access fabric?

Options:

A.

LISP

B.

IS-IS

C.

Cisco TrustSec

D.

VXLAN

Buy Now
Questions 51

Which two protocols are used with YANG data models? (Choose two.)

Options:

A.

NETCONF

B.

RESTCONF

C.

SSH

D.

TLS

E.

HTTPS

Buy Now
Questions 52

What is the structure of a JSON web token?

Options:

A.

header and payload

B.

three parts separated by dots: version, header, and signature

C.

payload and signature

D.

three parts separated by dots: header, payload. and signature

Buy Now
Questions 53

A wireless network engineer must configure a WPA2+WPA3 policy with the Personal security type. Which action meets this requirement?

Options:

A.

Configure the GCMP256 encryption cipher.

B.

Configure the CCMP128 encryption cipher.

C.

Configure the GCMP128 encryption cipher.

D.

Configure the CCMP256 encryption cipher.

Buy Now
Questions 54

What is a client who is running 802.1x for authentication reffered to as?

Options:

A.

supplicant

B.

NAC device

C.

authenticate

D.

policy enforcement point

Buy Now
Questions 55

Refer to the exhibit. A POST /discovery request spawns an asynchronous task. After querying for more information about the task, the Cisco DNA Center platform returns the REST API response. What is the status of the discovery task?

Options:

A.

restarted

B.

failed

C.

stopped

D.

successful

Buy Now
Questions 56

Which type of roaming event occurs when a client roams across multiple mobility groups?

Options:

A.

Layer 3

B.

Layer 7

C.

Layer 1

D.

Layer 2

Buy Now
Questions 57

Refer to lhe exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF-capable CiscoIOSXE device that Is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 58

What is the name of the numerical relationship of the wireless signal compared to the noise floor?

Options:

A.

SNR

B.

RSSI

C.

EIRP

D.

gain

Buy Now
Questions 59

What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?

Options:

A.

It facilitates software upgrades to network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It uses a predefined configuration through parameterized elements or variables.

D.

It provides a high-level overview of the health of every network device.

Buy Now
Questions 60

Where is radio resource management performed in a Cisco SD-Access wireless solution?

Options:

A.

DNA Center

B.

wireless controller

C.

Cisco CMX

D.

control plane node

Buy Now
Questions 61

Which function is performed by vSmart in the Cisco Catalyst SD-WAN architecture?

Options:

A.

facilitation of NAT detection and traversal

B.

redistribution between OMP and other routing protocols

C.

distribution of IPsec keys

D.

execution of localized policies

Buy Now
Questions 62

What is the responsibility of a secondary WLC?

Options:

A.

It avoids congestion on the primary controller by sharing the registration load on the LAPs.

B.

It registers the LAPs if the primary controller fails.

C.

It enables Layer 2 and Layer 3 roaming between itself and the primary controller.

D.

It shares the traffic load of the LAPs with the primary controller

Buy Now
Questions 63

What is one primary REST security design principle?

Options:

A.

fail-safe defaults

B.

password hash

C.

adding a timestamp in requests

D.

OAuth

Buy Now
Questions 64

In a fabric-enabled wireless network, which device is responsible for maintaining the endpoint ID database?

Options:

A.

fabric border node

B.

fabric edge node

C.

fabric wireless controller

D.

control plane node

Buy Now
Questions 65

An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:

Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.

After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.

The contents of the JSON-formatted file are as follows

Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.

Options:

Buy Now
Questions 66

Which technology collects location information through data packets received by the APs instead of using mobile device probes?

Options:

A.

detect and locate

B.

FastLocate

C.

hyperlocation

D.

RF fingerprinting

Buy Now
Questions 67

What is the base unit of definition in YANG?

Options:

A.

module

B.

include statement

C.

stanza

D.

node

Buy Now
Questions 68

Drag and drop the snippets onto the blanks within the code to construct a script that blocks a MAC address.

Options:

Buy Now
Questions 69

Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?

Options:

A.

GLBP

B.

HSRP v2

C.

VRRP

D.

HSRP v1

Buy Now
Questions 70

Which tag defines the properties to be applied to each specific WLAN?

Options:

A.

RF tag

B.

policy tag

C.

AP tag

D.

site tag

Buy Now
Questions 71

Which language can be used to model configuration and state data?

Options:

A.

JSON

B.

XML

C.

XDR

D.

YANG

Buy Now
Questions 72

How does Cisco DNA Center perform a network discovery?

Options:

A.

using SNMP

B.

using ICMP

C.

through a DHCP server

D.

using CDP with a seed IP address

Buy Now
Questions 73

A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?

Options:

A.

Identity PSK

B.

Fast Transition

C.

Central Web Authentication

D.

Cisco Centralized Key Management

Buy Now
Questions 74

Refer to the exhibit. The existing configuration must be updated to terminate all EXEC sessions after 120 minutes. Which command set should be applied?

Options:

A.

line vty 0 15

session-limit 120

B.

line vty 0 15

exec-timeout 120

C.

line vty 0 15

absolute-timeout 120

D.

line vty 0 15

session-timeout 120

Buy Now
Questions 75

Which lag/profile on a Cisco Catalyst 9800 Series WLC must be modified to allow Cisco ISE to dynamically assign VLANs to users on an 802.1X-based SSID?

Options:

A.

interface lag

B.

site tag

C.

WLAN profile

D.

policy profile

Buy Now
Questions 76

Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two.)

Options:

A.

modular QoS

B.

policy routing

C.

web authentication

D.

DHCP

E.

IEEE 802.1x

Buy Now
Questions 77

What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?

Options:

A.

real-time threat management to stop DDoS attacks to the core and access networks

B.

malware control

C.

real-time awareness of users, devices, and traffic on the network

D.

dynamic threat control for web traffic 

Buy Now
Questions 78

Which feature is available to clients using layer 2 roaming in a wireless infrastructure?

Options:

A.

Room to a different wireless controller that is on o different subnet and maintain the same IP address

B.

Associate to a new access point on a different wireless controller and change the IP address without connectivity interruption

C.

Associate to a new access point on the same wireless controller and change the IP address without connectivity interruption

D.

Roam to a different wireless controller that snares The same subnet and maintain the same IP address

Buy Now
Questions 79

Refer to the exhibit. An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required?

Options:

A.

Enable EAP parameters.

B.

Apply CISCO ISE default settings.

C.

Disable the RADIUS server accounting interim update.

D.

Select a RADIUS authentication server.

Buy Now
Questions 80

Which multicast operational mode sends a prune message to the source when there are no connected members or downstream neighbors?

Options:

A.

PIM sparse mode

B.

PIM dense mode

C.

IGMPv3

D.

IGMPv2

Buy Now
Questions 81

Refer to the exhibit.

Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 82

What is a characteristic of a virtual machine?

Options:

A.

It shares the host OS kernel, binaries, and libraries

B.

It is more resource efficient than a container

C.

It provides an environment completely isolated from the host OS

D.

It is more lightweight than a container

Buy Now
Questions 83

Which statement describes the Cisco SD-Access plane functionality for fabric-enabled wireless?

Options:

A.

Control plane traffic and data plane traffic are sent to the WLC through VXLAN.

B.

The control plane traffic is sent to the WLC through CAPWAP tunnels, and the data plane traffic is sent from the AP to the fabric edge switch through VXLAN.

C.

The control plane traffic is sent to the WLC through VXLAN, and the data plane traffic is sent to the WLC through CAPWAP tunnels.

D.

Control plane traffic and data plane traffic are sent to the WLC through CAPWAP tunnels.

Buy Now
Exam Code: 350-401
Exam Name: Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)
Last Update: Aug 17, 2025
Questions: 361
350-401 pdf

350-401 PDF

$33.25  $94.99
350-401 Engine

350-401 Testing Engine

$38.5  $109.99
350-401 PDF + Engine

350-401 PDF + Testing Engine

$50.75  $144.99