Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

350-401 Sample Questions Answers

Questions 4

Options:

Buy Now
Questions 5

Options:

Buy Now
Questions 6

Options:

Buy Now
Questions 7

Options:

Buy Now
Questions 8

Options:

Buy Now
Questions 9

Options:

Buy Now
Questions 10

Options:

Buy Now
Questions 11

Options:

Buy Now
Questions 12

Options:

Buy Now
Questions 13

Options:

Buy Now
Questions 14

Options:

Buy Now
Questions 15

Options:

Buy Now
Questions 16

Options:

Buy Now
Questions 17

Options:

Buy Now
Questions 18

OR

Options:

Buy Now
Questions 19

Options:

Buy Now
Questions 20

Options:

Buy Now
Questions 21

Options:

Buy Now
Questions 22

Options:

Buy Now
Questions 23

Options:

Buy Now
Questions 24

Options:

Buy Now
Questions 25

Options:

Buy Now
Questions 26

Options:

Buy Now
Questions 27

Options:

Buy Now
Questions 28

Options:

Buy Now
Questions 29

Options:

Buy Now
Questions 30

Why does the vBond orchestrator have a public IP?

Why does the vBond orchestrator have a public IP?

Options:

A.

to enable vBond to learn the public IP of WAN Edge devices that are behind NAT gateways or in private address space

B.

to facilitate downloading and distribution of operational and security patches

C.

to allow for global reachability from all WAN Edges in the Cisco SD-WAN and to facilitate NAT traversal

D.

to provide access to Cisco Smart Licensing servers for license enablement

Buy Now
Questions 31

Whichtwo benefits result from a network design mat uses small and repeatable sections? (Choose two.)

Options:

A.

lower monitoring requirements

B.

low latency

C.

scalability

D.

quick failure isolation

E.

improved throughput

Buy Now
Questions 32

How is a data modelling language used?

Options:

A.

To enable data to be easily structured grouped validated and replicated

B.

To represent finite and well-defined network elements that cannot be changed

C.

To model the flows of unstructured data within the infrastructure

D.

To provide human readability to scripting languages

Buy Now
Questions 33

How is Layer 3 roaming accomplished in a unified wireless deployment?

Options:

A.

An EoIP tunnel is created between the client and the anchor controller to provide seamless connectively as the client is associated with the new AP.

B.

The client entry on the original controller is passed to the database on the new controller.

C.

The new controller assign an IP address from the new subnet to the client.

D.

The client database on the original controller is updated with the anchor entry, and the new controller database is updated with the foreign entry.

Buy Now
Questions 34

Which data format can be used for an API request?

Options:

A.

HTML

B.

PERL

C.

JSON

D.

Python

Buy Now
Questions 35

What is a characteristic of a Type 2 hypervisor?

Options:

A.

quick deployment

B.

ideal for data center

C.

complicated deployment

D.

referred to as bare-metal

Buy Now
Questions 36

Which tool functions in a push model, supports languages like Python or Ruby, and does not require an agent to be installed per host?

Options:

A.

Puppet

B.

Ansible

C.

Saltstack

D.

Chef

Buy Now
Questions 37

An engineer must protect their company against ransom ware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?

Options:

A.

Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation.

B.

Use Cisco AMP deployment with the Malicious Activity Protection engine enabled.

C.

Use Cisco AMP deployment with the Exploit Prevention engine enabled.

D.

Use Cisco Firepower and block traffic to TOR networks.

Buy Now
Questions 38

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

•LocationA -72dBm

• Location B:-75 dBm

• Location C; -65 dBm

• Location D -80 dBm

Which two statements does the engineer use to explain these values to the customer? (Choose two.)

Options:

A.

The signal strength at location B is 10 dB better than location C.

B.

The signal strength at location C is too weak to support web surfing

C.

Location D has the strongest RF signal strength.

D.

The RF signal strength at location B is 50% weaker than location A.

E.

The RF signal strength at location C is 10 times stronger than location B

Buy Now
Questions 39

In a Cisco Mobility Express wireless deployment, which AP takes over if the primary AP fails?

Options:

A.

AP with highest IP address

B.

AP with the lowest IP address

C.

AP with highest MAC address

D.

AP with highest controller up time

Buy Now
Questions 40

Drag and drop the automation characteristics from the left to the corresponding tools on the right.

Options:

Buy Now
Questions 41

Which action reduces sticky clients in dense RF environments?

Options:

A.

Decrease radio channel widths to 40 MHz.

B.

Increase the mandatory minimum data rates.

C.

Decrease the mandatory minimum data rates.

D.

Increase radio channel widths to 160 MHz.

Buy Now
Questions 42

Refer to the exhibit. What is determined from the output?

Options:

A.

10.0.0.100 is managed by Cisco Catalyst Center (formerly DNA Center).

B.

The URL for the second query is syntactically incorrect.

C.

The authentication for the second query fails.

D.

10.0.0.200 is known to DNA Center, but its ID is an empty string.

Buy Now
Questions 43

In which forms can Cisco Catalyst SD-WAN routers be deployed at the perimeter of a site to provide SD-WAN services?

Options:

A.

virtualized instances

B.

hardware, software, cloud, and virtualized instances

C.

hardware, virtualized. and cloud instances

D.

hardware and virtualized instances

Buy Now
Questions 44

What is an advantage of utilizing data models in a multivendor environment?

Options:

A.

facilitating a unified approach to configuration and management

B.

improving communication security with binary-encoded protocols

C.

lowering CPU load incurred to managed devices

D.

removing the distinction between configuration and runtime state data

Buy Now
Questions 45

Which type of roaming event occurs when a client roams across multiple mobility groups?

Options:

A.

Layer 3

B.

Layer 7

C.

Layer 1

D.

Layer 2

Buy Now
Questions 46

Which access control feature does MAB provide?

Options:

A.

user access based on IP addressB slows devices to bypass authentication

B.

network access based on the physical address of a device

C.

simultaneous user and device authentication

Buy Now
Questions 47

What is the JSON syntax that is formed from the data?

Options:

A.

Make”:‘Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}

B.

'Make ”: “Gocar1, “Model”: “Zoom”, “Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]

C.

{“Make”: Gocar, “Model": Zoom, “Features": Power Windows, Manual Drive, Auto AC}

D.

(“Make”:[ “Gocar”, “Model": “Zoom"], Features”: [“Power Windows", “Manual Drive", “Auto AC”]}

Buy Now
Questions 48

An engineer must construct an access list for a Cisco Catalyst 9800 Series WLC that will redirect wireless guest users to a splash page that is hosted on a Cisco ISE server. The Cisco ISE servers are hosted at 10.9.11.141 and 10.1.11.141. Which access list meets the requirements?

Options:

A.

B.

C.

D.

Buy Now
Questions 49

Which method is used by an AP to join HA controllers and is configured in NVRAM?

Options:

A.

Primary/Secondary- Tertiary/Backup

B.

stored WLC information

C.

DNS

D.

IP Helper Addresses

Buy Now
Questions 50

What is the JSON syntax that is formed the data?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 51

Which method ensures the confidentiality of data exchanged over a REST API?

Options:

A.

Use TLS to secure the underlying HTTP session.

B.

Use me POST method Instead or URL-encoded GET to pass parameters.

C.

Deploy digest-based authentication to protect the access to the API.

D.

Encode sensitive data using Base64 encoding.

Buy Now
Questions 52

Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?

Options:

A.

ingress tunnel router

B.

map resolver

C.

egress tunnel router

D.

map server

Buy Now
Questions 53

Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?

Options:

A.

Device(config)# netconf lock-time 500

B.

Device(config)# netconf max-message 1000

C.

Device(config)# no netconf ssh acl 1

D.

Device(config)# netconf max-sessions 100

Buy Now
Questions 54

Which device makes the decision for a wireless client to roam?

Options:

A.

wireless client

B.

Wireless LAN controller

C.

access point

D.

WCS location server

Buy Now
Questions 55

Assuming the WLC's interfaces are not in the same subnet as the RADIUS server, which interface would the WLC use as the source for all RADIUS-related traffic?

Options:

A.

the interface specified on the WLAN configuration

B.

any interface configured on the WLC

C.

the controller management interface

D.

the controller virtual interface

Buy Now
Questions 56

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

Options:

A.

A close up of a text AI-generated content may be incorrect.

B.

A close up of a logo AI-generated content may be incorrect.

C.

A close up of a text AI-generated content may be incorrect.

D.

A black text on a white background AI-generated content may be incorrect.

Buy Now
Questions 57

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 58

Which two conditions occur when the primary route processor fails on a switch thatisusing dual route processors with stateful switchover? (Choose two.)

Options:

A.

Data forwarding is stopped until the routing protocols reconverge after the switchover.

B.

The standby route processor initialization is started when the primary router processor fails.

C.

The standby route processor is fully initialed and state information is maintained.

D.

User sessions are immediately recreated on the new active route processor.

E.

Data forwarding can continue along known paths until routing protocol information is restored.

Buy Now
Questions 59

Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used.

Options:

Buy Now
Questions 60

Which language can be used to model configuration and state data?

Options:

A.

JSON

B.

XML

C.

XDR

D.

YANG

Buy Now
Questions 61

Which framework is used for third-party authorization?

Options:

A.

API keys

B.

custom tokens

C.

OAuth

D.

SOAP

Buy Now
Questions 62

Refer to the exhibit.

An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?

Options:

A.

B.

C.

D.

Buy Now
Questions 63

Drag and drop the code snippets from the bottom onto the blanks in the Python script to print the device model to the screen and write JSON data to a file. Not all options are used

Options:

Buy Now
Questions 64

What occurs during a Layer 2 inter-controller roam?

Options:

A.

A new security context is applied for each controller to which the client is associated, but the IP address remains the same.

B.

The client must be associated to a new controller where a new IP address and security context are applied.

C.

The client retains the same IP address and security context.

D.

The client is marked as foreign in the database of each new controller to which it is connected.

Buy Now
Questions 65

Refer to lhe exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF-capable CiscoIOSXE device that Is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 66

When does a Cisco StackWise primary switch lose its role?

Options:

A.

when a stack member fails

B.

when the stack primary is reset

C.

when a switch with a higher priority is added to the stack

D.

when the priority value of a stack member is changed to a higher value

Buy Now
Questions 67

Which NGFW mode block flows crossing the firewall?

Options:

A.

Passive

B.

Tap

C.

Inline tap

D.

Inline

Buy Now
Questions 68

What is a characteristic of omnidirectional antennas?

Options:

A.

It includes dish antennas.

B.

It has high gain.

C.

It provides the most focused and narrow beamwidth.

D.

It includes dipole antennas.

Buy Now
Questions 69

Drag and drop the snippets onto the blanks within the code to construct a script that blocks a MAC address.

Options:

Buy Now
Questions 70

What is the structure of a JSON web token?

Options:

A.

header and payload

B.

three parts separated by dots: version, header, and signature

C.

payload and signature

D.

three parts separated by dots: header, payload. and signature

Buy Now
Questions 71

What are two of benefits of using VXLAN? (Choose two.)

Options:

A.

It allows for an unlimited number of segments.

B.

It has fewer devices to manage.

C.

It uses all available Layer 3 paths in the underlying network.

D.

It allows multi-tenanted segmentation.

E.

It uses a MAC in IP/TCP encapsulation technique.

Buy Now
Questions 72

Drag and drop the configuration management tools from the left onto the configuration styles they use on the right

Options:

Buy Now
Questions 73

What is the purpose of a data modeling language?

Options:

A.

to establish a framework to process data by using an object-oriented programming approach

B.

to specify the rules for transcoding between text and binary data encodings

C.

to standardize the procedures that are executed when parsing sent and received data

D.

to describe the structure and meaning of exchanged data

Buy Now
Questions 74

Refer to the exhibit. A POST /discovery request spawns an asynchronous task. After querying for more information about the task, the Cisco DNA Center platform returns the REST API response. What is the status of the discovery task?

Options:

A.

restarted

B.

failed

C.

stopped

D.

successful

Buy Now
Questions 75

Which two actions are recommended as security best practices to protect REST API? (Choose two.)

Options:

A.

Use SSL for encryption.

B.

Enable out-of-band authentication.

C.

Enable dual authentication of the session.

D.

Use TACACS+ authentication.

E.

Use a password hash.

Buy Now
Questions 76

An engineer is implementing a new SSID on a Cisco Catalyst 9800 Series WLC that must be broadcast on 6 GHz radios. Users will be required to use EAP-TLS to authenticate. Which wireless Layer 2 security method is required?

Options:

A.

WPA3 Personal

B.

WPA3 Enterprise

C.

WPA3 Enterprise

D.

WPA2 Personal

Buy Now
Questions 77

Which method does FastLocate use to collect location-based information?

Options:

A.

RFID

B.

client probing

C.

beacons

D.

data packets

Buy Now
Questions 78

In a wireless network environment, which measurement compares the received signal to the background noise?

Options:

A.

free space path loss

B.

link power budget

C.

fading

D.

SNR

Buy Now
Questions 79

What is the primary responsibility of the vBond orchestrator?

Options:

A.

to provide centralized management and provisioning of all elements into the network

B.

to configure NAT communication on WAN Edge routers

C.

to provide configuration synchronization of an WAN Edge devices

D.

to facilitate start-up by performing authentication and authorization of all elements into the network

Buy Now
Exam Code: 350-401
Exam Name: Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)
Last Update: Jun 27, 2025
Questions: 361
$70  $174.99
$54  $134.99
$46  $114.99
buy now 350-401