Spring Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Questions 4

Options:

Buy Now
Questions 5

OR

Options:

Buy Now
Questions 6

Options:

Buy Now
Questions 7

Options:

Buy Now
Questions 8

Options:

Buy Now
Questions 9

Options:

Buy Now
Questions 10

Options:

Buy Now
Questions 11

Options:

Buy Now
Questions 12

Options:

Buy Now
Questions 13

Options:

Buy Now
Questions 14

Options:

Buy Now
Questions 15

Options:

Buy Now
Questions 16

Options:

Buy Now
Questions 17

Options:

Buy Now
Questions 18

Options:

Buy Now
Questions 19

Options:

Buy Now
Questions 20

Options:

Buy Now
Questions 21

Options:

Buy Now
Questions 22

Options:

Buy Now
Questions 23

Options:

Buy Now
Questions 24

Options:

Buy Now
Questions 25

Options:

Buy Now
Questions 26

Options:

Buy Now
Questions 27

Which task Is mandatory when provisioning a device through the plug-and-play workflow in Cisco DNA Center?

Options:

A.

site assignment

B.

slack serial number assignment

C.

golden image upgrade

D.

template configuration application

Buy Now
Questions 28

Drag and drop the characteristics from the left onto the tools on the right. Not all options are used.

Options:

Buy Now
Questions 29

What is a characteristic of VRRP?

Options:

A.

It inherently balances load amongst the available gateways.

B.

It ensures symmetric traffic flow upstream and downstream.

C.

It Is a Cisco proprietary protocol.

D.

It uses a virtual IP address and a virtual MAC address to achieve redundancy

Buy Now
Questions 30

Options:

Buy Now
Questions 31

Options:

Buy Now
Questions 32

Drag and drop the characteristics of PIM Sparse Mode from the left to the right. Not all options are used.

Options:

Buy Now
Questions 33

In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?

Options:

A.

VXIAN

B.

IS-IS

C.

802.1

D.

CTS

Buy Now
Questions 34

Which design principle states that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?

Options:

A.

economy of mechanism

B.

fail-safe defaults

C.

complete mediation

D.

least privilege

Buy Now
Questions 35

Drag and drop the Cisco Catalyst Center (formerly DNA Center) southbound API characteristics from the left to the right. Not all options are used.

Options:

Buy Now
Questions 36

An engineer must configure a new 6 Ghz only SSID on a cisco catalyst 9800 series WLC, with these requirements:

Provide 802.11ax data rates for supported devices

All users authenticate using a certificate

Which wireless layer 2 security mode meets the requirements?

Options:

A.

WPA2 Enterprise

B.

WPA3 Personal

C.

WPA2 Personal

D.

WPA3 Enterprise

Buy Now
Questions 37

What are two device roles in the Cisco SD-Access fabric? (Choose two.)

Options:

A.

access switch

B.

vBond controller

C.

edge node

D.

core switch

E.

border node

Buy Now
Questions 38

What is a benefit of Cisco TrustSec in a multilayered LAN network design?

Options:

A.

Policy can be applied on a hop-by-hop basis.

B.

There is no requirement to run IEEE 802.1X when TrustSec is enabled on a switch port

C.

Application flows between hosts on the LAN to remote destinations can be encrypted.

D.

Policy or ACLs are not required.

Buy Now
Questions 39

Which method is used by an AP to join HA controllers and is configured in NVRAM?

Options:

A.

Primary/Secondary- Tertiary/Backup

B.

stored WLC information

C.

DNS

D.

IP Helper Addresses

Buy Now
Questions 40

In Cisco CatalystCenter(formerly DNA Center) Inventory, the Software Version of a networkdevice displays a status of OUTDATED. What does It me?

Options:

A.

There is a later software version available on Cisco Catalyst Center (formerly DNA Center).

B.

The current software image does not match the selected Golden image for this type of network device.

C.

The current type of software image does not match the type of the network device.

D.

There is a later software version available at www.cisco.com website.

Buy Now
Questions 41

Which method ensures the confidentiality of data exchanged over a REST API?

Options:

A.

Use TLS to secure the underlying HTTP session.

B.

Use me POST method Instead or URL-encoded GET to pass parameters.

C.

Deploy digest-based authentication to protect the access to the API.

D.

Encode sensitive data using Base64 encoding.

Buy Now
Questions 42

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

Options:

A.

Cisco Firepower and FireSIGHT

B.

Cisco Stealth watch system

C.

Advanced Malware Protection

D.

Cisco Web Security Appliance

Buy Now
Questions 43

Which NGFW mode block flows crossing the firewall?

Options:

A.

Passive

B.

Tap

C.

Inline tap

D.

Inline

Buy Now
Questions 44

Which two southbound interfaces originate from Cisco Catalyst Center (formerly DNA Center) and terminate at fabric underlay switches'? (Choose two.)

Options:

A.

ICMP Discovery

B.

UDP67 DHCP

C.

TCP 23 Telnet

D.

UDP6007 NetFlow

E.

UDP 162 SNMP

Buy Now
Questions 45

What is the role of a LISP map server?

Options:

A.

It receives information from ETRs that map EIDs to RLOCs

B.

It transmits requests for EID-to-RLOC resolution

C.

It transmits information from ETRs that map EIDs to RLOCs

D.

It responds to requests for EID-to-RLOC resolution.

Buy Now
Questions 46

Which deployment option of Cisco NGFW provides scalability?

Options:

A.

tap

B.

inline tap

C.

high availability

D.

clustering

Buy Now
Questions 47

What is a client who is running 802.1x for authentication reffered to as?

Options:

A.

supplicant

B.

NAC device

C.

authenticate

D.

policy enforcement point

Buy Now
Questions 48

How does NETCONF YANG represent data structures?

Options:

A.

as strict data structures defined by RFC 6020

B.

in an XML tree format

C.

In an HTML format

D.

as modules within a tree

Buy Now
Questions 49

Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?

Options:

A.

ETR

B.

MS

C.

ITR

D.

MR

Buy Now
Questions 50

Which antenna type should be used for a site-to-site wireless connection?

Options:

A.

omnidirectional

B.

patch

C.

dipole

D.

Yagi

Buy Now
Questions 51

Refer to the exhibit. What is achieved by this Python script?

Options:

A.

It configures access list statements

B.

It reads access list statements into a dictionary list

C.

It displays access list statements on a terminal screen.

D.

It converts access list statements to a human-readable format.

Buy Now
Questions 52

What is a benefit of YANG modules?

Options:

A.

tightly coupled models with encoding to improve performance

B.

easier multivendor interoperability provided by common or industry models

C.

avoidance of ecosystem fragmentation by having fixed modules that cannot be changed

D.

single protocol and model coupling to simplify maintenance and support

Buy Now
Questions 53

What is the recommended minimum SNR for Voice applications for networks?

Options:

A.

15

B.

20

C.

25

D.

10

Buy Now
Questions 54

Which message type is valid for IGMPv3?

Options:

A.

leave group

B.

hello

C.

graft

D.

source-specific membership report

Buy Now
Questions 55

A company recently decided to use RESTCONF instead of NETCONF. and many of their NETCONF scripts contain the operation (operation-create). Which RESTCONF operation must be used to replace these statements?

Options:

A.

CREATE

B.

POST

C.

GET

D.

PUT

Buy Now
Questions 56

Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.

Options:

A.

action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file"

B.

action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file"

C.

action 4.0 ens-event "show process cpu sorted | append flash:high-cpu-file"

D.

action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file"

Buy Now
Questions 57

Which AP mode allows administrators to generate pcap files to use for troubleshooting?

Options:

A.

Sniffer

B.

Local

C.

H-REAP

D.

Monitor

Buy Now
Questions 58

Which two Cisco SD-Access components provide communication between traditional network elements and the controller layer? (Choose two.)

Options:

A.

network underlay

B.

network control platform

C.

network data platform

D.

partner ecosystem

E.

fabric overlay

Buy Now
Questions 59

Drag and drop the characteristics from the left onto the orchestration tools they describe on the right.

Options:

Buy Now
Questions 60

Which action is a LISP Map Resolver responsible for?

Options:

A.

forwarding user data traffic

B.

accepting map-request messages from ITRs

C.

finding EID-to-RLOC mappings

D.

accepting registration requests from ETRs

Buy Now
Questions 61

What is used to measure the total output energy of a Wi-Fi device?

Options:

A.

dBi

B.

EIRP

C.

mW

D.

dBm

Buy Now
Questions 62

Refer to the exhibit.

What does the snippet of code achieve?

Options:

A.

It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

B.

It opens a tunnel and encapsulates the login information, if the host key is correct.

C.

It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

D.

It creates an SSH connection using the SSH key that is stored, and the password is ignored.

Buy Now
Questions 63

Which protocol does Cisco Catalyst SD-WAN use to protect control plane communication?

Options:

A.

OMP

B.

STUN

C.

DTLS

D.

IPsec

Buy Now
Questions 64

What is YANG used for?

Options:

A.

scraping data via CLI

B.

processing SNMP read-only polls

C.

describing data models

D.

prowling a transport for network configuration data between client and server

Buy Now
Questions 65

Drag and drop the wireless elements on the left to their definitions on the right.

Options:

Buy Now
Questions 66

Refer to the exhibit. What is the output of this code?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 67

What is one characteristic of Cisco DNA Center and vManage northbound APIs?

Options:

A.

They push configuration changes down to devices.

B.

They implement the RESTCONF protocol.

C.

They exchange XML-formatted content.

D.

They implement the NETCONF protocol.

Buy Now
Questions 68

Options:

Buy Now
Questions 69

Refer to the exhibit. Which action results from executing the Python script?

Options:

A.

display the unformatted output of a command that is entered on that device

B.

display the output of a command that is entered on that device in a single line

C.

SSH to the IP address that is manually entered on that device

D.

display the output of a command that is entered on that device

Buy Now
Questions 70

Which mechanism is used to protect the confidentiality of sensitive information exchanged over REST APIs?

Options:

A.

TLS

B.

802.1X

C.

SSH

D.

IPsec

Buy Now
Questions 71

What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?

Options:

A.

It facilitates software upgrades to network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It uses a predefined configuration through parameterized elements or variables.

D.

It provides a high-level overview of the health of every network device.

Buy Now
Questions 72

What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?

Options:

A.

SSH

B.

TLS

C.

HTTPS

D.

JWT

Buy Now
Questions 73

A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violates Which term refers to this REST security design principle?

Options:

A.

economy of mechanism

B.

complete mediation

C.

separation of privilege

D.

least common mechanism

Buy Now
Questions 74

Which two actions are recommended as security best practices to protect REST API? (Choose two.)

Options:

A.

Use SSL for encryption.

B.

Enable out-of-band authentication.

C.

Enable dual authentication of the session.

D.

Use TACACS+ authentication.

E.

Use a password hash.

Buy Now
Questions 75

Which language defines the structure or modeling of data for NETCONF and RESTCONF?

Options:

A.

YAML

B.

YANG

C.

JSON

D.

XML

Buy Now
Questions 76

Which RF value represents the decline of the RF signal amplitude over a given distance"?

Options:

A.

signal-to-noise ratio

B.

received signal strength indicator

C.

free space path loss

D.

effective isotropic radiated power

Buy Now
Questions 77

When deploying Cisco SD-Access Fabric APs, where does the data plane VXLAN tunnel terminate?

Options:

A.

on the first-hop fabric edge switch

B.

on the WLC node

C.

on the fabric border node switch

D.

directly on the fabric APs

Buy Now
Questions 78

Drag and drop the command snippets from the right onto the blanks in the configuration to create an EEM applet that will enable interface Loopback0 and log a message when the logging message -Interface Loopback0. changed state to administratively down" is received. Not all commands are used.

Options:

Buy Now
Questions 79

Which characteristics applies to Cisco SD-Access?

Options:

A.

It uses dynamic routing to discover and provision the border and edge switches

B.

It uses VXLAN for the control plane

C.

It uses PnP to discover and provision border and access switches

D.

It uses GRE tor me policy plane

Buy Now
Questions 80

Drag and drop the automation characteristics from the left onto the corresponding tools on the right. Not all options are used.

Options:

Buy Now
Questions 81

Refer to the exhibit.

An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 82

What is a client who is using 802.1x for authentication referred to as?

Options:

A.

authenticator

B.

policy enforcement point

C.

NAC device

D.

supplicant

Buy Now
Questions 83

What does a next-generation firewall that is deployed at the data center protect against?

Options:

A.

signature-based malware

B.

DMZ web server vulnerabilities

C.

zero-day attacks

D.

DDoS

Buy Now
Questions 84

When should the MAC authentication bypass feature be used on a switch port?

Options:

A.

when authentication is required, but the attached host does not support 802.1X

B.

when the attached host supports 802.1X and must authenticate itself based on its MAC address instead of user credentials

C.

when authentication should be bypassed for select hosts based on their MAC address

D.

when the attached host supports limited 802.1X

Buy Now
Questions 85

In a fabric-enabled wireless network, which device is responsible for maintaining the endpoint ID database?

Options:

A.

fabric border node

B.

fabric edge node

C.

fabric wireless controller

D.

control plane node

Buy Now
Questions 86

A customer has several small branches and wants to deploy a Wi-Fi solution with local management using CAPWAP. Which deployment model meets this requirement?

Options:

A.

local mode

B.

SD-Access wireless

C.

autonomous

D.

Mobility Express

Buy Now
Questions 87

Refer to the exhibit. What is achieved by this Python script?

Options:

A.

It displays the output from show lldp neighbors into a standard output.

B.

It reads the neighbor count from show lldp neighbors into a dictionary list.

C.

It displays the Layer 3 neighbors from show lldp neighbors on the terminal screen.

D.

It reads the output from show lldp neighbors into an array object.

Buy Now
Questions 88

Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Exam Code: 350-401
Exam Name: Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)
Last Update: Apr 7, 2026
Questions: 393
350-401 pdf

350-401 PDF

$28.5  $94.99
350-401 Engine

350-401 Testing Engine

$33  $109.99
350-401 PDF + Engine

350-401 PDF + Testing Engine

$43.5  $144.99