Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

350-401 Sample Questions Answers

Questions 4

Options:

Buy Now
Questions 5

Options:

Buy Now
Questions 6

Options:

Buy Now
Questions 7

Options:

Buy Now
Questions 8

Options:

Buy Now
Questions 9

With IGMPv2, which multicast group address does the IGMP querier use to send query messages to all hosts on the LAN?

Options:

A.

239.0.0.2

B.

224.0.0.1

C.

239.0.0.1

D.

224.0.0.2

Buy Now
Questions 10

Drag and drop the command snippets from the right onto the blanks in the configuration to create an EEM applet that will enable interface Loopback0 and log a message when the logging message -Interface Loopback0. changed state to administratively down" is received. Not all commands are used.

Options:

Buy Now
Questions 11

Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity?

Options:

A.

802. 1d

B.

802.1x

C.

802.1q

D.

802.1w

Buy Now
Questions 12

Which AP mode allows administrators to generate pcap files to use for troubleshooting?

Options:

A.

Sniffer

B.

Local

C.

H-REAP

D.

Monitor

Buy Now
Questions 13

Which new security enhancement is introduced by deploying a next-generation firewall at the data center in addition to the Internet edge?

Options:

A.

virtual private network for remote access

B.

DDoS protection

C.

firewall protection of the east-west traffic at the data center

D.

firewall protection of the south-north traffic at the data center

Buy Now
Questions 14

What are two characteristics of Cisco Catalyst SD-WAN? (Choose two.)

Options:

A.

control plane operates over DTLS/TLS authenticated and secured tunnels

B.

time-consuming configuration and maintenance

C.

distributed control plane

D.

unified data plane and control plane

E.

centralized reachability, security, and application policies

Buy Now
Questions 15

Why would a network engineer configure an AP in SE-Connect mode?

Options:

A.

to redirect WLAN traffic to an endpoint for protocol analysis

B.

to monitor the VLAN traffic for rogue APs

C.

to connect the wired LAN with the wireless infrastructure

D.

to analyze the RF spectrum surrounding the AP

Buy Now
Questions 16

Drag and drop the REST API authentication methods from the left onto their descriptions on the right.

Options:

Buy Now
Questions 17

Which data format can be used for an API request?

Options:

A.

HTML

B.

PERL

C.

JSON

D.

Python

Buy Now
Questions 18

Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.

Options:

Buy Now
Questions 19

A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described?

Options:

A.

intra-VLAN

B.

inter-controller

C.

intra-controller

D.

inter-subnet

Buy Now
Questions 20

What occurs during a Layer 2 inter-controller roam?

Options:

A.

A new security context is applied for each controller to which the client is associated, but the IP address remains the same.

B.

The client must be associated to a new controller where a new IP address and security context are applied.

C.

The client retains the same IP address and security context.

D.

The client is marked as foreign in the database of each new controller to which it is connected.

Buy Now
Questions 21

Which DNS record type is needed to allow a Cisco AP to discover a WLC when using IPv4?

Options:

A.

CNAME record

B.

A record

C.

NS record

D.

SOA record

Buy Now
Questions 22

What is the JSON syntax that is formed the data?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 23

Which access control feature does MAB provide?

Options:

A.

user access based on IP addressB slows devices to bypass authentication

B.

network access based on the physical address of a device

C.

simultaneous user and device authentication

Buy Now
Questions 24

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?

Options:

A.

Layer 3

B.

inter-xTR

C.

auto anchor

D.

fast roam

Buy Now
Questions 25

What is the purpose of a data modeling language?

Options:

A.

to establish a framework to process data by using an object-oriented programming approach

B.

to specify the rules for transcoding between text and binary data encodings

C.

to standardize the procedures that are executed when parsing sent and received data

D.

to describe the structure and meaning of exchanged data

Buy Now
Questions 26

Which multicast operational mode sends a prune message to the source when there are no connected members or downstream neighbors?

Options:

A.

PIM sparse mode

B.

PIM dense mode

C.

IGMPv3

D.

IGMPv2

Buy Now
Questions 27

In a high-density AP environment, which feature can be used to reduce the RF cell size and not demodulate radio packets above a given threshold?

Options:

A.

RX-SOP

B.

FRA

C.

80211k

D.

RRM

Buy Now
Questions 28

How does NETCONF YANG represent data structures?

Options:

A.

as strict data structures defined by RFC 6020

B.

in an XML tree format

C.

In an HTML format

D.

as modules within a tree

Buy Now
Questions 29

A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?  

Options:

A.

host dependent  

B.

weighted

C.

least connection

D.

round robin

Buy Now
Questions 30

Which tag defines the roaming domain and properties of an AP deployment?

Options:

A.

RF tag

B.

policy tag

C.

site tag

D.

AP tag

Buy Now
Questions 31

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

•LocationA -72dBm

• Location B:-75 dBm

• Location C; -65 dBm

• Location D -80 dBm

Which two statements does the engineer use to explain these values to the customer? (Choose two.)

Options:

A.

The signal strength at location B is 10 dB better than location C.

B.

The signal strength at location C is too weak to support web surfing

C.

Location D has the strongest RF signal strength.

D.

The RF signal strength at location B is 50% weaker than location A.

E.

The RF signal strength at location C is 10 times stronger than location B

Buy Now
Questions 32

What is the purpose of data modeling languages?

Options:

A.

to describe a data schema convertible into any data encoding format

B.

to specify algorithms necessary to decode binary-encoded protocol data units

C.

to translate encoded data for interoperability between different CPU architectures

D.

to provide a framework to describe data flow patterns in networks

Buy Now
Questions 33

Refer to the exhibit. An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required?

Options:

A.

Enable EAP parameters.

B.

Apply CISCO ISE default settings.

C.

Disable the RADIUS server accounting interim update.

D.

Select a RADIUS authentication server.

Buy Now
Questions 34

Which unit of measure is used to measure wireless RF SNR?

Options:

A.

mw

B.

dbm

C.

db

D.

dBi

Buy Now
Questions 35

What does a next-generation firewall that is deployed at the data center protect against?

Options:

A.

signature-based malware

B.

DMZ web server vulnerabilities

C.

zero-day attacks

D.

DDoS

Buy Now
Questions 36

What is the measure of the difference between the received signal and the noise floor in a wireless environment?

Options:

A.

XOR

B.

RSSI

C.

RRM

D.

SNR

Buy Now
Questions 37

What is one primary REST security design principle?

Options:

A.

fail-safe defaults

B.

password hash

C.

adding a timestamp in requests

D.

OAuth

Buy Now
Questions 38

Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used.

Options:

Buy Now
Questions 39

Which action reduces sticky clients in dense RF environments?

Options:

A.

Decrease radio channel widths to 40 MHz.

B.

Increase the mandatory minimum data rates.

C.

Decrease the mandatory minimum data rates.

D.

Increase radio channel widths to 160 MHz.

Buy Now
Questions 40

Refer to the exhibit. An engineer must adjust the configuration so that Router A becomes the active router. Which commands should be applied to router A? (Choose two)

Options:

A.

vrrp 1 priority 90

B.

vrrp 1 timers advertise 1

C.

vrrp lip 10.1.0.11

D.

ip address 10.1.0.11 255.0.0.0

E.

vrrp 1 priority 120

Buy Now
Questions 41

In a wireless network environment, which measurement compares the received signal to the background noise?

Options:

A.

free space path loss

B.

link power budget

C.

fading

D.

SNR

Buy Now
Questions 42

Which technology collects location information through data packets received by the APs instead of using mobile device probes?

Options:

A.

detect and locate

B.

FastLocate

C.

hyperlocation

D.

RF fingerprinting

Buy Now
Questions 43

Which two southbound interfaces originate from Cisco Catalyst Center (formerly DNA Center) and terminate at fabric underlay switches'? (Choose two.)

Options:

A.

ICMP Discovery

B.

UDP67 DHCP

C.

TCP 23 Telnet

D.

UDP6007 NetFlow

E.

UDP 162 SNMP

Buy Now
Questions 44

Refer to the exhibit. What is achieved by this Python script?

Options:

A.

It configures access list statements

B.

It reads access list statements into a dictionary list

C.

It displays access list statements on a terminal screen.

D.

It converts access list statements to a human-readable format.

Buy Now
Questions 45

Which method requires a client to authenticate and has the capability to function without encryption?

Options:

A.

open

B.

WEP

C.

WebAuth

D.

PSK

Buy Now
Questions 46

What is an advantage of utilizing data models in a multivendor environment?

Options:

A.

facilitating a unified approach to configuration and management

B.

improving communication security with binary-encoded protocols

C.

lowering CPU load incurred to managed devices

D.

removing the distinction between configuration and runtime state data

Buy Now
Questions 47

Which NGFW mode block flows crossing the firewall?

Options:

A.

Passive

B.

Tap

C.

Inline tap

D.

Inline

Buy Now
Questions 48

Drag and drop the snippets onto the blanks within the code to construct a script that blocks a MAC address.

Options:

Buy Now
Questions 49

Which technique is used to protect end user devices and data from unknown file behavior?

Options:

A.

crypto file ransomware protection using a file hash calculation

B.

file retrospection using continuous scan and analyses

C.

phishing file quarantine using an internal environment to store attached files

D.

file sandboxing using a protected environment to analyze and simulate the behavior of unknown files

Buy Now
Questions 50

Drag and drop the configuration management tools from the left onto the configuration styles they use on the right

Options:

Buy Now
Questions 51

An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:

Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.

After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.

The contents of the JSON-formatted file are as follows

Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.

Options:

Buy Now
Questions 52

Which type of tunnel is required between two WLCs to enable intercontroller roaming?

Options:

A.

LWAPP

B.

CAPWAP

C.

IPsec

D.

mobility

Buy Now
Questions 53

Which method displays text directly into the active console with a synchronous EEM applet policy?

Options:

A.

event manager applet boom

event syslog pattern 'UP'

action 1.0 gets 'logging directly to console'

B.

event manager applet boom

event syslog pattern 'UP'

action 1.0 syslog priority direct msg 'log directly to console'

C.

event manager applet boom

event syslog pattern 'UP'

action 1.0 puts 'logging directly to console'

D.

event manager applet boom

event syslog pattern 'UP'

action 1.0 string 'logging directly to console'

Buy Now
Questions 54

What is the primary responsibility of the vBond orchestrator?

Options:

A.

to provide centralized management and provisioning of all elements into the network

B.

to configure NAT communication on WAN Edge routers

C.

to provide configuration synchronization of an WAN Edge devices

D.

to facilitate start-up by performing authentication and authorization of all elements into the network

Buy Now
Questions 55

What is one characteristic of Cisco SD-Access networks?

Options:

A.

Devices are assigned to virtual networks based on their VLAN membership.

B.

Scalable group tags are used for macrosegmentatlon.

C.

Virtual networks are used for microsegmentation.

D.

All traffic is Layer 3 within the fabric.

Buy Now
Questions 56

To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?

Options:

A.

security ft adaptive

B.

security wpa akm dotlx

C.

security wpa akm psk

D.

security wpa akm ft psk

Buy Now
Questions 57

An engineer is implementing a new SSID on a Cisco Catalyst 9800 Series WLC that must be broadcast on 6 GHz radios. Users will be required to use EAP-TLS to authenticate. Which wireless Layer 2 security method is required?

Options:

A.

WPA3 Personal

B.

WPA3 Enterprise

C.

WPA3 Enterprise

D.

WPA2 Personal

Buy Now
Questions 58

What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?

Options:

A.

broadcast discover request

B.

join request to all the WLCs

C.

unicast discovery request to each WLC

D.

Unicast discovery request to the first WLS that resolves the domain name

Buy Now
Questions 59

Drag and drop the automation characteristics from the left to the corresponding tools on the right.

Options:

Buy Now
Questions 60

Which two protocols are used with YANG data models? (Choose two.)

Options:

A.

NETCONF

B.

RESTCONF

C.

SSH

D.

TLS

E.

HTTPS

Buy Now
Questions 61

A wireless administrator must create a new web authentication corporate SSID that will be using ISE as the external RADIUS server. The guest VLAN must be specified after the authentication completes. Which action must be performed to allow the ISE server to specify the guest VLAN?

Options:

A.

Set RADIUS Profiling.

B.

Set AAA Policy name.

C.

Enable Network Access Control State.

D.

Enable AAA Override.

Buy Now
Questions 62

Refer to the exhibit. Which configuration causes the traffic from PC-1 to the internet to use the link between CoreSW-1 and CoreSW-2 when both switches are up?

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 63

Options:

Buy Now
Questions 64

Options:

Buy Now
Questions 65

Options:

Buy Now
Questions 66

Options:

Buy Now
Questions 67

OR

Options:

Buy Now
Questions 68

Options:

Buy Now
Questions 69

Options:

Buy Now
Questions 70

Options:

Buy Now
Questions 71

Options:

Buy Now
Questions 72

Options:

Buy Now
Questions 73

Options:

Buy Now
Questions 74

Options:

Buy Now
Questions 75

Options:

Buy Now
Questions 76

Options:

Buy Now
Questions 77

Options:

Buy Now
Questions 78

Options:

Buy Now
Questions 79

Options:

Buy Now
Questions 80

Options:

Buy Now
Questions 81

Options:

Buy Now
Questions 82

Options:

Buy Now
Questions 83

Options:

Buy Now
Exam Code: 350-401
Exam Name: Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)
Last Update: Aug 9, 2025
Questions: 361
$61.25  $174.99
$47.25  $134.99
$40.25  $114.99
buy now 350-401