Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)
Last Update 6 days ago
Total Questions : 775
350-401 is stable now with all latest exam questions are added 6 days ago. Just download our Full package and start your journey with Cisco Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) certification. All these Cisco 350-401 practice questions are real and verified by our Experts in the related industry fields.
An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail Which configuration should be applied?
In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)
Refer to the exhibit.
An engineer configures OSPF and wants to verify the configuration Which configuration is applied to this device?
A)
B)
C)
D)
What are two considerations when using SSO as a network redundancy feature? (Choose two)
Refer to the exhibit.
An engineer troubleshoots connectivity issues with an application. Testing is performed from the server gateway, and traffic with the DF bit set is dropped along the path after increasing packet size. Removing the DF bit setting at the gateway prevents the packets from being dropped. What is the cause of this issue?
Drag and drop the snippets onto the blanks within the code to construct a script that shows all logging that occurred on the appliance from Sunday until 9:00 p.m Thursday Not all options are used.
What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two)
Refer to the exhibit.
Which command when applied to the Atlanta router reduces type 3 LSA flooding into the backbone area and summarizes the inter-area routes on the Dallas router?
Refer the exhibit.
Which router is the designated router on the segment 192.168.0.0/24?
In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?
Refer to the exhibit.
An engineer must create a configuration that prevents R3from receiving the LSA about 172.16.1.4/32.Which configuration set achieves this goal?
Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two.)
Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?
Refer to the exhibit.
An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?
Refer to the exhibit.
What is required to configure a second export destination for IP address 192.168.10.1?
Which protocol is used to encrypt control plane traffic between SD-WAN controllers and SD-WAN endpoints?
Refer to the exhibit.
After running the code in the exhibit. Which step reduces the amount of data that NETCONF server returns to the NETCONF client, to only the interface’s configuration?
What is the process for moving a virtual machine from one host machine to another with no downtime?
Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interfaces are misconfigured on these routers?
Which element enables communication between guest VMs within a virtualized environment?
Refer to the exhibit.
Which command set must be added to the configuration to analyze 50 packets out of every 100?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must permit traffic from these networks and block all other traffic An informational log message should be triggered when traffic enters from these prefixes Which access list must be used?
Refer to the exhibit.
The traceroute fails from R1 to R3. What is the cause of the failure?
Drag and drop the characteristics from the left onto the corresponding infrastructure deployment models on the right.
Using the EIRP formula,what parameter is subtracted to determine the EIRP value?
Drag and drop the LISP components on the left to the correct description on the right.
Refer to the exhibit. R1 and R2 are directly connected, but the BGP session does not establish. Which action must be taken to build an eBGP session?
Refer to the exhibit. Which configuration must be applied to ensure that the preferred path for traffic from AS 65010 toward AS 65020 uses the R2 to R4 path?
A)
B)
C)
D)
Refer to the exhibit. Traffic is not passing between SW1 and SW2. Which action fixes the issue?
What is a benefit of Cisco TrustSec in a multilayered LAN network design?
Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings?
Refer to the exhibit Which two commands are required on route» R1 to block FTP and allow all other traffic from the Branch 2 network’ (Choose two)
Refer to the exhibit.
Only administrators from the subnet 10.10.10.0/24 are permitted to have access to the router. A secure protocol must be used for the remote access and management of the router instead of clear-text protocols. Which configuration achieves this goal?
Refer to the exhibit.
Which two commands ensure that DSW1 becomes the root bridge for VLAN 10 and 20? (Choose two.)
A customer wants to connect a device to an autonomous Cisco AP configured as a WG
B.
The WGB is configured properly: however, it fails to associate to a CAPWAP- enabled AP. Which change must be applied in the advanced WLAN settings to resolve this issue?: 194
Refer to the exhibit.
Which type of antenna is shown on the radiation patterns?
Refer to the exhibit. What is printed to the console when this script is run?
An engineer must protect the password for the VTY lines against over-the-shoulder attacks. Which configuration should be applied?
What does the destination MAC on the outer MAC header identify in a VXLAN packet?
Refer to the exhibit. A network engineer configures NAT on R1 and enters me show command to verity me configuration What toes the output confirm?
Which two features are available only in next-generation firewalls? (Choose two.)
An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?
Drag and drop the characteristics from the left onto the protocols they apply to on the right?
Refer to the exhibit. The connecting between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two)
While configuring an IOS router for HSRP with a virtual IP of 10 1.1.1. an engineer sees this log message.
Which configuration change must the engineer make?
Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.
How does an on-premises infrastructure compare to a cloud infrastructure?
Refer to the exhibit.
An engineer implemented several configuration changes and receives the logging message on switch1. Which action should the engineer take to resolve this issue?
Refer to the exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)
Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Which line must be added in the Python function to return the JSON object {"cat_9k": “FXS193202SE")?
A)
B)
C)
D)
In a Cisco SD-Access solution, what is the role of the Identity Services Engine?
A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?
Refer to the exhibit. Which action completes the configuration to achieve a dynamic continuous mapped NAT for all users?
When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?
Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?
Refer to the exhibit.
A network engineer is configuring OSPF between router R1 and router R2. The engineer must ensure that a DR/BDR election does not occur on the Gigabit Ethernet interfaces in area 0. Which configuration set accomplishes this goal?
A)
B)
C)
D)
A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. This message is logged to the console of router R1:
Which two configuration allow peering session to from between R1 and R2? Choose two.)
Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?
Refer to the exhibit.
A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).
Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?
Refer to the exhibit.
Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
A large campus network has deployed two wireless LAN controllers to manage the wireless network. WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?
An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSP
F.
Which command set accomplishes this task?A)
B)
C)
D)
ESTION NO: 450
Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (choose two)
Refer to the exhibit.
An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel Which configuration must be applied?
A)
B)
C)
D)
In a Cisco Catalyst switch equipped with two supervisor modules an administrator must temporally remove the active supervisor from the chassis to perform hardware maintenance on it. Which mechanism ensure that the active supervisor removal is not disruptive to the network operation?
Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?
What is a characteristic of the overlay network in the Cisco SD-Access architecture?
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
In a Cisco SD-Access wireless architecture which device manages endpoint ID to edge node bindings?
Reter to the exhibit.
An administrator troubleshoots intermittent connectivity from internal hosts to an external public server. Some internal hosts can connect to the server while others receive an ICMP Host Unreachable message and these hosts change over time. What is the cause of this issue?
Refer to the exhibit. An engineer tries to log in to router R1. Which configuration enables a successful login?
A)
B)
C)
D)
An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, WHICH VIRTUAL IP address must be used in this configuration?
Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
Drag and drop the characteristics from the left to the table types on the right.
Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?
Which function does a fabric AP perform in a cisco SD-access deployment?
An administrator is configuring NETCONF using the following XML string. What must the administrator end the request with?
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSP
F.
In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
TESTED 01 Oct 2023
Hi this is Romona Kearns from Holland and I would like to tell you that I passed my exam with the use of exams4sure dumps. I got same questions in my exam that I prepared from your test engine software. I will recommend your site to all my friends for sure.
Our all material is important and it will be handy for you. If you have short time for exam so, we are sure with the use of it you will pass it easily with good marks. If you will not pass so, you could feel free to claim your refund. We will give 100% money back guarantee if our customers will not satisfy with our products.