Implementing Cisco Enterprise Network Core Technologies (ENCOR)
Last Update Mar 24, 2023
Total Questions : 746
We are offering FREE 350-401 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 350-401 free exam questions and then go for complete pool of Implementing Cisco Enterprise Network Core Technologies (ENCOR) test questions that will help you more.
Refer to the exhibit.
How does the router handle traffic after the CoPP policy is configured on the router?
Drag and drop the snippets onto the blanks within the code to construct a script that advertises the network prefix 192.168.5.0/24 into a BGP session. Not all options are used
Drag and drop characteristics of PIM dense mode from the left to the right.
A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)
Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?
Refer to the exhibit.
What is the result when a technician adds the monitor session 1 destination remote vlan 223 command1?
Refer to the exhibit.
An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?
Refer to the exhibit.
An engineer configures the BGP adjacency between R1 and R2, however, it fails to establish Which action resolves the issue?
What are two considerations when using SSO as a network redundancy feature? (Choose two)
An engineer is working with the Cisco DNA Center API Drag and drop the methods from the left onto the actions that they are used for on the right.
Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (choose two)
Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected is switch2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two)
A network is being migrated from IPV4 to IPV6 using a dual-stack approach. Network management is already 100% IPV6 enabled. In a dual-stack network with two dual-stack NetFlow collections, how many flow exporters are needed per network device in the flexible NetFlow configuration?
A network engineer must configure a router to send logging messages to a syslog server based on these requirements:
Which configuration must be used?
Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right.
Refer to the exhibit.
An engineer must configure and validate a CoPP policy that allows the network management server to monitor router R1 via SNMP while protecting the control plane. Which two commands or command sets must be used? (Choose two.)
Refer to the exhibit.
The trunk does not work over the back-to-back link between Switch1 interface Giq1/0/20 and Switch2 interface Gig1/0/20. Which configuration fixes the problem?
A)
B)
C)
D)
Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?
An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail Which configuration should be applied?
Refer to the exhibit.
An engineer must create a configuration that executes the show run command and then terminates the session when user CCNP legs in. Which configuration change is required?
Why is an AP joining a different WLC than the one specified through option 43?
A company requires a wireless solution to support its mam office and multiple branch locations. All sites have local Internet connections and a link to the main office lor corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?
AN engineer is implementing MPLS OAM to monitor traffic within the MPLS domain. Which action must the engineer perform to prevent from being forwarded beyond the service provider domain when the LSP is down?
Which Python snippet should be used to store the devices data structure in a JSON file?
A)
B)
C)
D)
Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.
Refer to the exhibit.
An engineer is troubleshooting a connectivity issue and executes a traceoute. What does the result confirm?
If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
What is a consideration when designing a Cisco SD-Access underlay network?
Which measurement is used from a post wireless survey to depict the cell edge of the access points?
Refer to the exhibit.
A network engineer is configuring OSPF between router R1 and router R2. The engineer must ensure that a DR/BDR election does not occur on the Gigabit Ethernet interfaces in area 0. Which configuration set accomplishes this goal?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Refer to the exhibit. Which action completes the configuration to achieve a dynamic continuous mapped NAT for all users?
What is the function of a fabric border node in a Cisco SD-Access environment?
Which line must be added in the Python function to return the JSON object {"cat_9k": “FXS193202SE")?
A)
B)
C)
D)
Which AP mode allows an engineer to scan configured channels for rogue access points?
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?
An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, WHICH VIRTUAL IP address must be used in this configuration?
Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?
Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?
Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)
An engineer must configure a router to leak routes between two VRFs Which configuration must the engineer apply?
Refer to the exhibit.
An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?
A)
B)
C)
D)
Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?
Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)
Refer to the exhibit.
An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?
A)
B)
C)
D)
Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?
A)
B)
C)
D)
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?
Refer to the exhibit.
An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection, however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?
Wireless users report frequent disconnections from the wireless network. While troubleshooting a network engineer finds that after the user a disconnect, the connection re-establishes automatically without any input required. The engineer also notices these message logs .
Which action reduces the user impact?
Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?
Refer to the exhibit.
Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the technology types on the right.
A network engineer must configure a switch to allow remote access for all feasible protocols. Only a password must be requested for device authentication and all idle sessions must be terminated in 30 minutes. Which configuration must be applied?
An administrator is configuring NETCONF using the following XML string. What must the administrator end the request with?
An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSPF. Which command set accomplishes this task?
A)
B)
C)
D)
Refer to the exhibit. A network engineer Is troubleshooting an Issue with the file server based on reports of slow file transmissions. Which two commands or command sets are required. In switch SW1 to analyze the traffic from the file server with a packet analyzer? (Choose two.)
A)
B)
C)
D)
Refer to the exhibit. An engineer must configure an ERSPAN tunnel that mirrors traffic from linux1 on Switch1 to Linux2 on Switch2. Which command must be added to the destination configuration to enable the ERSPAN tunnel?
Refer to the exhibit.
Assuming all links are functional, which path does PC1 take to reach DSW1?
Why would a customer implement an on-premises solution instead of a cloud solution?
Refer to the exhibit An engineer is troubleshooting a newly configured BGP peering that does not establish What is the reason for the failure?
An engineer is connected to a Cisco router through a Telnet session. Which command must be issued to view the logging messages from the current session as soon as they are generated by the router?
Refer to the exhibit. An engineer is reaching network 172.16.10.0/24 via the R1-R2-R4 path. Which configuration forces the traffic to fake a path of R1-R3-R4?
A)
B)
C)
D)
Refer to the exhibit. Which two configurations enable R1 and R2 to advertise routes into OSPF? (Choose two)
A)
B)
C)
D)
E)
Which of the following are examples of Type 2 hypervisors? (Choose three.)
Refer to the exhibit.
An engineer configures a new WLAN that will be used for secure communications; however, wireless clients report that they are able to communicate with each other. Which action resolves this issue?
Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two )
Which configuration enables a device to be configured via NETCONF over SSHv2?
A)
B)
C)
D)
In a Cisco SD-Access wireless environment, which device is responsible for hosting the anycast gateway?
Drag and drop the automation characteristics from the left onto the corresponding tools on the right.
Refer to the exhibit.
The server in DC2 is expecting traffic from the database in DC1 to use the source network of 10.50.250.0/24. The server sends the initial request. The inside global IP is configured for 10.50.250.1. What is the result of this configuration?
Refer to the exhibit. Which command set completes the ERSPAN session configuration?
Refer to the exhibit Which two commands are required on route» R1 to block FTP and allow all other traffic from the Branch 2 network’ (Choose two)
An engineer must protect the password for the VTY lines against over-the-shoulder attacks. Which configuration should be applied?
An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?
Which two steps are required for a complete Cisco DNA Center upgrade? (Choose two.)
Refer to the exhibit. An engineer must allow the FTP traffic from users on 172.16.1.0 /24 to 172.16.2.0 /24 and block all other traffic. Which configuration must be applied?
A)
B)
C)
D)
Refer to the exhibit Users cannot reach the web server at 192.168 100 1. What is the root cause for the failure?
What is the process for moving a virtual machine from one host machine to another with no downtime?
A network engineer is enabling HTTPS access to the core switch, which requires a certificate to be installed on the switch signed by the corporate certificate authority Which configuration commands are required to issue a certificate signing request from the core switch?
A)
B)
C)
D)
An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?