Latest Cisco 350-401 ENCOR Exam Questions and Answers – Study Online Today

Get ready for the Cisco 350-401 ENCOR exam! Study the latest questions and answers online. Boost your prep and pass with confidence—start now!

Sep 8, 2025 - 18:02
 0  0

NEW QUESTION 1

Which two pieces of information are necessary to compute SNR? (Choose two.)

 

A.  EIRP

B.  noise floor

C.  antenna gain

D.  RSSI

E.  transmit power

 

Answer: BD

 

 

NEW QUESTION 2

A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)

 

A.  Configure the logging synchronous global configuration command

B.  Configure the logging delimiter feature

C.  Configure the logging synchronous command under the vty

D.  Press the TAB key to reprint the command in a new line

E.  increase the number of lines on the screen using the terminal length command

 

Answer: CD

 

 

NEW QUESTION 3

Refer to the exhibit.


An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which

 

A.  Mastered

B.  Not Mastered

 

Answer: A

 

Explanation:

of this behavior is true?

A.  Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.

B.  Only standard access control lists can block traffic from a source IP address.

C.  After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.

D.  The access control list must contain an explicit deny to block traffic from the router. Answer: A

 

 

NEW QUESTION 4

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

 

A.  logging host 10.2.3.4 vrf mgmt transport tcp port 6514

B.  logging host 10.2.3.4 vrf mgmt transport udp port 6514

C.  logging host 10.2.3.4 vrf mgmt transport tcp port 514

D.  logging host 10.2.3.4 vrf mgmt transport udp port 514

 

Answer: A

 

 

NEW QUESTION 5

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?

 

A.  NTP server

B.  PKI server

C.  RADIUS server

D.  TACACS server

 

Answer: C

 

 

NEW QUESTION 6

If a VRRP master router fails, which router is selected as the new master router?

 

A.  router with the highest priority

B.  router with the highest loopback address

C.  router with the lowest loopback address

D.  router with the lowest priority

 

Answer: A

 

 

NEW QUESTION 7

Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session?

 

A.  HTTP Status Code 200

B.  HTTP Status Code 302

C.  HTTP Status Code 401

D.  HTTP Status Code: 504

 

Answer: C

 

 

NEW QUESTION 8

Which statement about Cisco Express Forwarding is true?

 

A.  It uses a fast cache that is maintained in a router data plane.

B.  maintains two tables in the data plane the FIB and adjacency table.

C.  It makes forwarding decisions by a process that is scheduled through the IOS scheduler.

D.  The CPU of a router becomes directly involved with packet-switching decisions.

 

Answer: B

 

 

NEW QUESTION 9

Which IP SLA operation requires the IP SLA responder to be configured on the remote end?

 

A.  ICMP echo

B.  UDP jitter

C.  CMP jitter

D.  TCP connect

 

Answer: D

 

 

NEW QUESTION 10

Which statement about multicast RPs is true?

 

A.  RPs are required only when using protocol independent multicast dense mode.

B.  RPs are required for protocol independent multicast sparse mode and dense mode.

C.  By default, the RP is needed periodically to maintain sessions with sources and receivers

D.  By default, the RP is needed only to start new sessions with sources and receivers.

 

Answer: D

 

 

NEW QUESTION 10

Which two mechanisms are available to secure NTP? (Choose two.)

 

A.  IP prefix list-based

B.  IPsec

C.  TACACS-based authentication

D.  IP access list-based

E.  Encrypted authentication

 

Answer: DE

 

 

NEW QUESTION 15

Which statement explains why Type 1 hypervisor is considered more efficient than Type 2 hypervisor?

 

A.  Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS.

B.  Type 1 hypervisor enables other operating systems to run on it.

C.  Type 1 hypervisor relics on the existing OS of the host machine to access CPU, memory, storage, andnetwork resources.

D.  Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques.

 

Answer: A

 

 

NEW QUESTION 16

Which statement about a fabric access point is true?

 

A.  It is in local mode an must be connected directly to the fabric border node.

B.  It is in FlexConnect mode and must be connected directly to the fabric border node.

C.  It is in local mode an must connected directly to the fabric edge switch.

D.  It is in FlexConnect mode and must be connected directly to the fabric edge switch.

 

Answer: C

 

 

NEW QUESTION 19


Drag and drop the characteristics from the left onto the correct infrastructure deployment types on the right.

 

 

A.  Mastered

B.  Not Mastered

 

Answer: A

 

Explanation:

On premise: customizable,specific requirements,resources Cloud: scale, built-in automated backup, strong stable internet

 

 

NEW QUESTION 20

IS OSPF, which LAS type is responsible for pointing to the ASBR router?

 

A.  type 1

B.  type 2

C.  type 3

D.  type 4

 

Answer: D

 

 

NEW QUESTION 22

What the role of a fusion in an SD-Access solution?

 

A.  provides connectivity to external networks

B.  acts as a DNS server

C.  performs route leaking between user-defined virtual networks and shared services

D.  provides additional forwarding capacity to the fabric

 

Answer: C

 

 

NEW QUESTION 24

What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment?

 

A.  faster deployment times because additional infrastructure does not need to be purchased

B.  lower latency between systems that are physically located near each other

C.  less power and cooling resources needed to run infrastructure on-premises

D.  ability to quickly increase compute power without the need to install additional hardware

 

Answer: B

 

 

NEW QUESTION 27

What is a benefit of data modeling languages like YANG?

 

A.  They enable programmers to change or write their own application within the device operating system.

B.  They create more secure and efficient SNMP OIDs.

C.  They make the CLI simpler and more efficient.

D.  They provide a standardized data structure, which results in configuration scalability and consistency.

 

Answer: D

 

 

NEW QUESTION 30

Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors?

 

A.  Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes.

 

B.  Each virtual machine requires a unique IP address but shares the MAC address with the physical server

C.  Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server.

D.  Each virtual machine requires a unique MAC address but shares the IP address with the physical server.

 

Answer: A

 

 

NEW QUESTION 33

A local router shows an EBGP neighbor in the Active state. Which statement is true about the local router?

 

A.  The local router has active prefix in the forwarding table from the neighboring router

B.  The local router has BGP passive mode configured for the neighboring router

C.  The local router is attempting to open a TCP session with the neighboring router.

D.  The local router is receiving prefixes from the neighboring router and adding them in RIB-IN

 

Answer: C

 

 

NEW QUESTION 35


Refer to the exhibit.

Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning- tree port-priority 32 command on GO/1 on SW2, but the port remains blocked. Which command should be entered on the ports that are connected to Link2 to resolve the issue?

 

A.  Enter spanning-tree port-priority 32 on SW1.

B.  Enter spanning-tree port-priority 224 on SW1.

C.  Enter spanning-tree port-priority 4 on SW2.

D.  Enter spanning-tree port-priority 64 on SW2.

 

Answer: A

 

 

NEW QUESTION 38

Which LISP infrastructure device provides connectivity between non-sites and LISP sites by receiving non-LISP traffic with a LISP site destination?

 

A.  PETR

B.  PITR

C.  map resolver

D.  map server

 

Answer: B

 

 

NEW QUESTION 42

Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?

 

A.  GLBP

B.  HSRP v2

C.  VRRP

D.  HSRP v1

 

Answer: A

 

 

NEW QUESTION 43

What do Cisco DNA southbound APIs provide?

 

A.  Interface between the controller and the network devices

B.  NETCONF API interface for orchestration communication

 

C.  RESful API interface for orchestrator communication

D.  Interface between the controller and the consumer

 

Answer: A

 

 

NEW QUESTION 45

Which statement about route targets is true when using VRF-Lite?

 

A.  When BGP is configured, route targets are transmitted as BGP standard communities.

B.  Route targets control the import and export of routes into a customer routing table.

C.  Route targets allow customers to be assigned overlapping addresses.

D.  Route targets uniquely identify the customer routing table.

 

Answer: B

 

 

NEW QUESTION 49

Which QoS component alters a packet to change the way that traffic is treated in the network?

 

A.  Marking

B.  Classification

C.  Shaping

D.  Policing

 

Answer: A

 

 

NEW QUESTION 53


Refer to the exhibit.

Which statement about the OPSF debug output is true?

 

A.  The output displays all OSPF messages which router R1 has sent to received on interface Fa0/1.

B.  The output displays all OSPF messages which router R1 has sent or received on all interfaces.

C.  The output displays OSPF hello messages which router R1 has sent received on interface Fa0/1.

D.  The output displays OSPF hello and LSACK messages which router R1 has sent or received.

 

Answer: C

 

 

NEW QUESTION 57

How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?

 

A.  uses flexible NetFlow

B.  assigns a VLAN to the endpoint

C.  classifies traffic based an the contextual identity of the endpoint rather than its IP address

D.  classifies traffic based on advanced application recognition

 

Answer: C

 

 

NEW QUESTION 59

Which description of an SD-Access wireless network infrastructure deployment is true?

 

A.  The access point is part of the fabric underlay.

B.  The WLC is part of the fabric underaly.

C.  The access point is part the fabirc overlay.

D.  The wireless client is part of the fabirc overlay.

 

Answer: C

 

 

NEW QUESTION 62


Refer to the exhibit.

Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?

A)

 

 


B)

C)


D)

 

 

A.  Option A

B.  Option B

C.  Option C

D.  Option D

 

Answer: A

 

 

NEW QUESTION 65


Which JSON syntax is valid?

 

 

 

A.  Option A

B.  Option B

C.  Option C

D.  Option D

 

Answer: B

 

 

NEW QUESTION 67

 

Which two protocols are used with YANG data models? (Choose two.)

 

A.  HTTPS

B.  SSH

C.  RESTCONF

D.  TLS

E.  NFTCONF

 

Answer: CE

 

 

NEW QUESTION 68

Which statement about TLS is true when using RESTCONF to write configurations on network devices?

 

A.  It is provided using NGINX acting as a proxy web server.

B.  It is no supported on Cisco devices.

C.  It required certificates for authentication.

D.  It is used for HTTP and HTTPs requests.

 

Answer: C

 

 

NEW QUESTION 71

To increase total throughput and redundancy on the links between the wireless controller and switch, the customer enabled LAG on the wireless controller Which EtherChannel mode must be configured on the switch to allow the WLC to connect?

 

A.  Auto

B.  Active

C.  On

D.  Passive

 

Answer: C

 

 

NEW QUESTION 74

What is the correct EBGP path attribute list, ordered from most preferred to the least preferred, that the BGP best-path algorithm uses?

 

A.  weigh

B.  AS path, local preferenc

C.  MED

D.  weight, local preference AS path, MED

E.  local preference weight AS path, MED

F.  local preference, weight MED, AS path

 

Answer: B

 

 

NEW QUESTION 78

Refer to the exhibit.

 

 

SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command meets this requirement?


A)

B)


C)

D)

 

 

A.  Option A

B.  Option B

C.  Option C

D.  Option D

 

Answer: D

 

 

NEW QUESTION 81

 

Which feature is supported by ElGRP but is not supported by OSPF?

 

A.  route summarization

B.  equal-cost load balancing

C.  unequal-cost load balancing

D.  route filtering

 

Answer: C

 

 

NEW QUESTION 82


Refer to the exhibit.

What is the JSON syntax that is formed the data?

 

A.  Name: Bob, Johson, Age: 75, Alive: true, Favourite Food

B.  [Cereal, ''Mustard'', ''Onions}}

C.  Name'', ''Bob'' Johson'', ''Age'', 75, ''Alive'', true, ''favourite Foods'', [''Cereal, ''Mustard'', Onions''}}

D.  Name', 'Bob Johson,' 'Age', 75, 'Alive', true, 'favourite Foods' 'Cereal’, ’Mustard', 'Onions'}

E.  Name''. ''Bob Johson'', ''Age'': Seventyfive, ''Alive'' true, ''favourite Foods'' ,[Cereal'' ''Mustard'' ''Onions''}}

 

Answer: C

 

 

NEW QUESTION 84

What is the difference between a RIB and a FIB?

 

A.  The RIB is used to make IP source prefix-based switching decisions

B.  The FIB is where all IP routing information is stored

C.  The RIB maintains a mirror image of the FIB

D.  The FIB is populated based on RIB content

 

Answer: D

 

 

NEW QUESTION 88

Which two operations are valid for RESTCONF? (Choose two.)

 

A.  HEAD

B.  REMOVE

C.  PULL

D.  PATCH

E.  ADD

F.  PUSH

 

Answer: AD

 

 

NEW QUESTION 89

What are two common sources of interference for WI-FI networks? (Choose two.)

 

A.  radar

B.  LED lights

C.  rogue AP

D.  conventional oven

E.  fire alarm

 

Answer: AC

What's Your Reaction?

Like Like 0
Dislike Dislike 0
Love Love 0
Funny Funny 0
Angry Angry 0
Sad Sad 0
Wow Wow 0
Deenadayalan Welcome to TNNEWS, your trusted source for news and updates from around the world. Our goal is to provide timely, informative content across various topics, including world news, technology, health, education, movies, and more. Please note that TNNEWS is an independent news platform created to share knowledge, useful links, and updates for your benefit. We are not affiliated with any government or political organization. The content here is purely for informational purposes and aims to provide insights into global and local trends. Feel free to explore, read, and stay informed!