Latest Cisco 350-401 ENCOR Exam Questions and Answers – Study Online Today
Get ready for the Cisco 350-401 ENCOR exam! Study the latest questions and answers online. Boost your prep and pass with confidence—start now!
NEW QUESTION 1
Which two pieces of information are necessary to compute SNR? (Choose two.)
A. EIRP
B. noise floor
C. antenna gain
D. RSSI
E. transmit power
Answer: BD
NEW QUESTION 2
A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)
A. Configure the logging synchronous global configuration command
B. Configure the logging delimiter feature
C. Configure the logging synchronous command under the vty
D. Press the TAB key to reprint the command in a new line
E. increase the number of lines on the screen using the terminal length command
Answer: CD
NEW QUESTION 3
Refer to the exhibit.
An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which
A. Mastered
B. Not Mastered
Answer: A
Explanation:
of this behavior is true?
A. Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.
B. Only standard access control lists can block traffic from a source IP address.
C. After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.
D. The access control list must contain an explicit deny to block traffic from the router. Answer: A
NEW QUESTION 4
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
A. logging host 10.2.3.4 vrf mgmt transport tcp port 6514
B. logging host 10.2.3.4 vrf mgmt transport udp port 6514
C. logging host 10.2.3.4 vrf mgmt transport tcp port 514
D. logging host 10.2.3.4 vrf mgmt transport udp port 514
Answer: A
NEW QUESTION 5
When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?
A. NTP server
B. PKI server
C. RADIUS server
D. TACACS server
Answer: C
NEW QUESTION 6
If a VRRP master router fails, which router is selected as the new master router?
A. router with the highest priority
B. router with the highest loopback address
C. router with the lowest loopback address
D. router with the lowest priority
Answer: A
NEW QUESTION 7
Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session?
A. HTTP Status Code 200
B. HTTP Status Code 302
C. HTTP Status Code 401
D. HTTP Status Code: 504
Answer: C
NEW QUESTION 8
Which statement about Cisco Express Forwarding is true?
A. It uses a fast cache that is maintained in a router data plane.
B. maintains two tables in the data plane the FIB and adjacency table.
C. It makes forwarding decisions by a process that is scheduled through the IOS scheduler.
D. The CPU of a router becomes directly involved with packet-switching decisions.
Answer: B
NEW QUESTION 9
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?
A. ICMP echo
B. UDP jitter
C. CMP jitter
D. TCP connect
Answer: D
NEW QUESTION 10
Which statement about multicast RPs is true?
A. RPs are required only when using protocol independent multicast dense mode.
B. RPs are required for protocol independent multicast sparse mode and dense mode.
C. By default, the RP is needed periodically to maintain sessions with sources and receivers
D. By default, the RP is needed only to start new sessions with sources and receivers.
Answer: D
NEW QUESTION 10
Which two mechanisms are available to secure NTP? (Choose two.)
A. IP prefix list-based
B. IPsec
C. TACACS-based authentication
D. IP access list-based
E. Encrypted authentication
Answer: DE
NEW QUESTION 15
Which statement explains why Type 1 hypervisor is considered more efficient than Type 2 hypervisor?
A. Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS.
B. Type 1 hypervisor enables other operating systems to run on it.
C. Type 1 hypervisor relics on the existing OS of the host machine to access CPU, memory, storage, andnetwork resources.
D. Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques.
Answer: A
NEW QUESTION 16
Which statement about a fabric access point is true?
A. It is in local mode an must be connected directly to the fabric border node.
B. It is in FlexConnect mode and must be connected directly to the fabric border node.
C. It is in local mode an must connected directly to the fabric edge switch.
D. It is in FlexConnect mode and must be connected directly to the fabric edge switch.
Answer: C
NEW QUESTION 19
Drag and drop the characteristics from the left onto the correct infrastructure deployment types on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
On premise: customizable,specific requirements,resources Cloud: scale, built-in automated backup, strong stable internet
NEW QUESTION 20
IS OSPF, which LAS type is responsible for pointing to the ASBR router?
A. type 1
B. type 2
C. type 3
D. type 4
Answer: D
NEW QUESTION 22
What the role of a fusion in an SD-Access solution?
A. provides connectivity to external networks
B. acts as a DNS server
C. performs route leaking between user-defined virtual networks and shared services
D. provides additional forwarding capacity to the fabric
Answer: C
NEW QUESTION 24
What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment?
A. faster deployment times because additional infrastructure does not need to be purchased
B. lower latency between systems that are physically located near each other
C. less power and cooling resources needed to run infrastructure on-premises
D. ability to quickly increase compute power without the need to install additional hardware
Answer: B
NEW QUESTION 27
What is a benefit of data modeling languages like YANG?
A. They enable programmers to change or write their own application within the device operating system.
B. They create more secure and efficient SNMP OIDs.
C. They make the CLI simpler and more efficient.
D. They provide a standardized data structure, which results in configuration scalability and consistency.
Answer: D
NEW QUESTION 30
Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors?
A. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes.
B. Each virtual machine requires a unique IP address but shares the MAC address with the physical server
C. Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server.
D. Each virtual machine requires a unique MAC address but shares the IP address with the physical server.
Answer: A
NEW QUESTION 33
A local router shows an EBGP neighbor in the Active state. Which statement is true about the local router?
A. The local router has active prefix in the forwarding table from the neighboring router
B. The local router has BGP passive mode configured for the neighboring router
C. The local router is attempting to open a TCP session with the neighboring router.
D. The local router is receiving prefixes from the neighboring router and adding them in RIB-IN
Answer: C
NEW QUESTION 35
Refer to the exhibit.
Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning- tree port-priority 32 command on GO/1 on SW2, but the port remains blocked. Which command should be entered on the ports that are connected to Link2 to resolve the issue?
A. Enter spanning-tree port-priority 32 on SW1.
B. Enter spanning-tree port-priority 224 on SW1.
C. Enter spanning-tree port-priority 4 on SW2.
D. Enter spanning-tree port-priority 64 on SW2.
Answer: A
NEW QUESTION 38
Which LISP infrastructure device provides connectivity between non-sites and LISP sites by receiving non-LISP traffic with a LISP site destination?
A. PETR
B. PITR
C. map resolver
D. map server
Answer: B
NEW QUESTION 42
Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?
A. GLBP
B. HSRP v2
C. VRRP
D. HSRP v1
Answer: A
NEW QUESTION 43
What do Cisco DNA southbound APIs provide?
A. Interface between the controller and the network devices
B. NETCONF API interface for orchestration communication
C. RESful API interface for orchestrator communication
D. Interface between the controller and the consumer
Answer: A
NEW QUESTION 45
Which statement about route targets is true when using VRF-Lite?
A. When BGP is configured, route targets are transmitted as BGP standard communities.
B. Route targets control the import and export of routes into a customer routing table.
C. Route targets allow customers to be assigned overlapping addresses.
D. Route targets uniquely identify the customer routing table.
Answer: B
NEW QUESTION 49
Which QoS component alters a packet to change the way that traffic is treated in the network?
A. Marking
B. Classification
C. Shaping
D. Policing
Answer: A
NEW QUESTION 53
Refer to the exhibit.
Which statement about the OPSF debug output is true?
A. The output displays all OSPF messages which router R1 has sent to received on interface Fa0/1.
B. The output displays all OSPF messages which router R1 has sent or received on all interfaces.
C. The output displays OSPF hello messages which router R1 has sent received on interface Fa0/1.
D. The output displays OSPF hello and LSACK messages which router R1 has sent or received.
Answer: C
NEW QUESTION 57
How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?
A. uses flexible NetFlow
B. assigns a VLAN to the endpoint
C. classifies traffic based an the contextual identity of the endpoint rather than its IP address
D. classifies traffic based on advanced application recognition
Answer: C
NEW QUESTION 59
Which description of an SD-Access wireless network infrastructure deployment is true?
A. The access point is part of the fabric underlay.
B. The WLC is part of the fabric underaly.
C. The access point is part the fabirc overlay.
D. The wireless client is part of the fabirc overlay.
Answer: C
NEW QUESTION 62
Refer to the exhibit.
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
NEW QUESTION 65
Which JSON syntax is valid?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
NEW QUESTION 67
Which two protocols are used with YANG data models? (Choose two.)
A. HTTPS
B. SSH
C. RESTCONF
D. TLS
E. NFTCONF
Answer: CE
NEW QUESTION 68
Which statement about TLS is true when using RESTCONF to write configurations on network devices?
A. It is provided using NGINX acting as a proxy web server.
B. It is no supported on Cisco devices.
C. It required certificates for authentication.
D. It is used for HTTP and HTTPs requests.
Answer: C
NEW QUESTION 71
To increase total throughput and redundancy on the links between the wireless controller and switch, the customer enabled LAG on the wireless controller Which EtherChannel mode must be configured on the switch to allow the WLC to connect?
A. Auto
B. Active
C. On
D. Passive
Answer: C
NEW QUESTION 74
What is the correct EBGP path attribute list, ordered from most preferred to the least preferred, that the BGP best-path algorithm uses?
A. weigh
B. AS path, local preferenc
C. MED
D. weight, local preference AS path, MED
E. local preference weight AS path, MED
F. local preference, weight MED, AS path
Answer: B
NEW QUESTION 78
Refer to the exhibit.
SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command meets this requirement?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
NEW QUESTION 81
Which feature is supported by ElGRP but is not supported by OSPF?
A. route summarization
B. equal-cost load balancing
C. unequal-cost load balancing
D. route filtering
Answer: C
NEW QUESTION 82
Refer to the exhibit.
What is the JSON syntax that is formed the data?
A. Name: Bob, Johson, Age: 75, Alive: true, Favourite Food
B. [Cereal, ''Mustard'', ''Onions}}
C. Name'', ''Bob'' Johson'', ''Age'', 75, ''Alive'', true, ''favourite Foods'', [''Cereal, ''Mustard'', Onions''}}
D. Name', 'Bob Johson,' 'Age', 75, 'Alive', true, 'favourite Foods' 'Cereal’, ’Mustard', 'Onions'}
E. Name''. ''Bob Johson'', ''Age'': Seventyfive, ''Alive'' true, ''favourite Foods'' ,[Cereal'' ''Mustard'' ''Onions''}}
Answer: C
NEW QUESTION 84
What is the difference between a RIB and a FIB?
A. The RIB is used to make IP source prefix-based switching decisions
B. The FIB is where all IP routing information is stored
C. The RIB maintains a mirror image of the FIB
D. The FIB is populated based on RIB content
Answer: D
NEW QUESTION 88
Which two operations are valid for RESTCONF? (Choose two.)
A. HEAD
B. REMOVE
C. PULL
D. PATCH
E. ADD
F. PUSH
Answer: AD
NEW QUESTION 89
What are two common sources of interference for WI-FI networks? (Choose two.)
A. radar
B. LED lights
C. rogue AP
D. conventional oven
E. fire alarm
Answer: AC
What's Your Reaction?






