350-401 ENCOR:Implementing Cisco Enterprise Network Core Technologies Update:November 11, 2025 Questions and Answers: 376 Q&A 1. What are two device roles in the Cisco SD-Access fabric? (Choose two.) A. access switch B. vBond controller C. edge node D. core switch E. border node 2. Why is a Type 1 hypervisor more efficient than a Type 2 hypervisor? A. Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques. B. Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS. C. Type 1 hypervisor enables other operating systems to run on it. D. Type 1 hypervisor relies on the existing OS of the host machine to access CPU, memory, storage, and network resources. None 3. When should the MAC authentication bypass feature be used on a switch port? A. when authentication is required, but the attached host does not support 802.1X B. when the attached host supports 802.1X and must authenticate itself based on its MAC address instead of user credentials C. when authentication should be bypassed for select hosts based on their MAC address D. when the attached host supports limited 802.1X None 4. What is used by vManage to interact withCiscoSD-WAN devices in the fabric? A. northbound API B. RESTCONF C. Southbound API D. IPsec None 5. Drag and drop the characteristics from the left onto the orchestration tool classifications on the right. A. None 6. Which feature provides data-plane security for Cisco Catalyst SD-WAN networks'? A. IPsec B. SSH C. IPS D. TLS/DTLS None 7. Which method requires a client to authenticate and has the capability to function without encryption? A. open B. WEP C. WebAuth D. PSK None 8. Drag and drop the Cisco Catalyst Center (formerly DNA Center) southbound API characteristics from the left to the right. Not all options are used. None 9. What is a Type 1 hypervisor? A. runs directly on a physical server and depends on a previously installed operating system B. runs directly on a physical server and includes its own operating system C. runs on a virtual server and depends on an already installed operating system D. run on a virtual server and includes its own operating system. None 10. Which type of roaming event occurs when a client roams across multiple mobility groups? A. Layer 3 B. Layer 7 C. Layer 1 D. Layer 2 None 11. An engineer must create a script that appends the output of the show process cpu sorted command to a file. event snmp oid 1.3.6.1.4.1.9.9.109.1.1.1.1.3 get-type next entry-op gt entry-val 80 poll-interval 5!action 1.0 cli command "enable"action 2.0 syslog msg "high cpu"action 3.0 cli command "term length 0" A. action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file" B. action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file" C. action 4.0 ens-event "show process cpu sorted | append flash:high-cpu-file" D. action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file" None 12. Which message type is valid for IGMPv3? A. leave group B. hello C. graft D. source-specific membership report None 13. Which two southbound interfaces originate from Cisco Catalyst Center (formerly DNA Center) and terminate at fabric underlay switches'? (Choose two.) A. ICMP Discovery B. UDP67 DHCP C. TCP 23 Telnet D. UDP6007 NetFlow E. UDP 162 SNMP 14. What does the LAP send when multiple WLCs respond to the CISCO_CAPWAPCONTROLLER.localdomain hostname during the CAPWAP discovery and join process? A. broadcast discover request B. join request to all the WLCs C. unicast discovery request to each WLC D. Unicast discovery request to the first WLS that resolves the domain name None 15. Drag and drop the command snippets from the right onto the boxes to create an EEM applet that will enable interface LoopbackO when the logging message 'Interface Loopback0. changed state to administratively down" is received. Not all commands are used and some commands are used more than once. A. None 16. What is a characteristics of Wi-Fi channels? A. The 2 4-GHz balWMS§24 non-overlapping channels B. Devices that connect to the same Wi-Fi channel reside in the same collision domain. C. Wi-Fi channels are spaced 30 MHz apart. D. The 5-GHz band offers 11 different channels for Wi-Fi clients None 17. What is the structure of a JSON web token? A. header and payload B. three parts separated by dots: version, header, and signature C. payload and signature D. three parts separated by dots: header, payload. and signature None 18. Which two Cisco SD-Access components provide communication between traditional network elements and the controller layer? (Choose two.) A. network underlay B. network control platform C. network data platform D. partner ecosystem E. fabric overlay None 19. What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object? A. SSH B. TLS C. HTTPS D. JWT None 20. What is one characteristic of an AP that is operating in Mobility Express mode? A. It is recommended for large scale deployments. B. It requires a centralized WLC. C. At least three APs are needed for WLC redundancy. D. It requires an AP to act as a WLC. None 21. Which protocol does Cisco Catalyst SD-WAN use to protect control plane communication? A. OMP B. STUN C. DTLS D. IPsec None 22. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use? ip sla 10icmp-echo 192.168.10.20timeout 500frequency 3ip sla schedule 10 life forever start-time nowtrack 10 ip sla 10 reachability A. event manager applet EEM_IP_SLAevent track 10 state down B. event manager applet EEM_IP_SLAevent sla 10 state unreachable C. event manager applet EEM_IP_SLAevent sla 10 state down D. event manager applet EEM_IP_SLAevent track 10 state unreachable None 23. What is a benefit of Cisco TrustSec in a multilayered LAN network design? A. Policy can be applied on a hop-by-hop basis. B. There is no requirement to run IEEE 802.1X when TrustSec is enabled on a switch port C. Application flows between hosts on the LAN to remote destinations can be encrypted. D. Policy or ACLs are not required. None 24. Simulation 25 Solution: Sw10 config t no int po2 int et0/0 channel-group 2 mode active no shut spanning-tree vlan 10a pri 0 wr None 25. Which feature is needed to maintain the IP address of a client when an inter-controller Layer 3 roam is performed between two WLCs that are using different mobility groups? A. interface groups B. RF groups C. AAA override D. auto anchor None 26. A company recently decided to use RESTCONF instead of NETCONF. and many of their NETCONF scripts contain the operation (operation-create). Which RESTCONF operation must be used to replace these statements? A. CREATE B. POST C. GET D. PUT None 27. Simulation 9 Solution on R1: R1# copy run start Verification: None 28. What is a client who is using 802.1x for authentication referred to as? A. authenticator B. policy enforcement point C. NAC device D. supplicant None 29. What does the error message relay to the administrator who is trying to configure a Cisco IOS device? A. A NETCONF request was made for a data model that does not exist. B. The device received a valid NETCONF request and serviced it without error. C. A NETCONF message with valid content based on the YANG data models was made, but the request failed. D. The NETCONF running datastore is currently locked. None 30. How does Cisco DNA Center perform a network discovery? A. using SNMP B. using ICMP C. through a DHCP server D. using CDP with a seed IP address None 31. To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC? A. security ft adaptive B. security wpa akm dotlx C. security wpa akm psk D. security wpa akm ft psk None 32. Ascriptcontainsthe statement white loop != 999 ’ Which value terminates the loop? A. A value equal to 999. B. A value not equal to 999. C. A value greater than or equal to 999. D. A value less than or equal to 999. None 33. Simulation 15 Solution: R1 Config t Int et0/0 Ip flow monitor Monitor-R1Flow input Ip flow monitor Monitor-R1Flow output Exit Ip sla 1 Icmp-echo 10.12.1.2 Freq 300 Ip sla schedule 1 life foreve start-time now Sw1 Config t Monitor session 12 source vlan 12 Monitor session 12 destination interface et1/3 None 34. What is a benefit of YANG modules? A. tightly coupled models with encoding to improve performance B. easier multivendor interoperability provided by common or industry models C. avoidance of ecosystem fragmentation by having fixed modules that cannot be changed D. single protocol and model coupling to simplify maintenance and support None 35. A network administrator is preparing a Python script to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running. Which operation of the NC client manager prevents colleagues from making changes to the devices while the script is running? A. m.freeze(config-running') B. m.freeze(target-running') C. m.lock(config='running') D. m.lock(target-running') None 36. Which NGFW mode block flows crossing the firewall? A. Passive B. Tap C. Inline tap D. Inline None 37. Simulation 13 Solution: R1 Config t Flow exporter Export-NetFlowENCOR destination 10.10.1.110 transport udp 2055 exit flow moni Monitor-NetFlowENCOR exit ip sla 1 http gethttp://10.10.1.100 frequ 300 exit ip sla schedule 1 life forever start-time now wr SW1 Config t Monitor session 7 source interface e0/0 Monitor session 7 destination interface e1/1 End Wr None 38. What is a characteristic of omnidirectional antennas? A. It includes dish antennas. B. It has high gain. C. It provides the most focused and narrow beamwidth. D. It includes dipole antennas. None 39. An engineer must configure a new WLAN that supports 802.11r and requires users to enter a passphrase. What must be configured to support this requirement? A. 802.1XandSUITEB-1X B. FT PSK and Fast Transition C. 802.1X and Fast Transition D. FTPSKandSUITEB-1X None 40. Which three methods does Cisco Catalyst Center (formerly DNA Center) use to discover devices? (Choose three.) A. SNMP B. a specified range of IP addresses C. NETCONF D. LLDP E. ping F. CDP None 41. In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC? A. Layer 3 B. inter-xTR C. auto anchor D. fast roam None 42. What is the JSON syntax that is formed the data? Name is Bob JohnsonAge is 75Is aliveFavorite foods are: Cereal Mustard Onions A.{Name":"Bob Johnson","Age:Seventyfive,"Alive":true,"Favorite Foods":[Cerear,"Mustard,"Onions"} B.{"Name":"Bob Johnson',"Age":75."Alive":true,"Favorite Foods":[Cereal,"Mustard,"Onions"}} C.{Name:Bob Johnson,Age:75.Alive:true,Favorite Foods:[Cereal,Mustard,Onions] D.{Name':"'Bob Johnson','Age':75,'Alive':True,'Favorite Foods:'Cereal,Mustard,'Onions" None 43. Which antenna type should be used for a site-to-site wireless connection? A. omnidirectional B. patch C. dipole D. Yagi None 44. Which features does Cisco EDR use to provide threat detection and response protection? A. containment, threat intelligence, and machine learning B. firewalling and intrusion prevention C. container-based agents D. cloud analysts and endpoint firewall controls None 45. A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violates Which term refers to this REST security design principle? A. economy of mechanism B. complete mediation C. separation of privilege D. least common mechanism None 46. When deploying Cisco SD-Access Fabric APs, where does the data plane VXLAN tunnel terminate? A. on the first-hop fabric edge switch B. on the WLC node C. on the fabric border node switch D. directly on the fabric APs None 47. In a high-density AP environment, which feature can be used to reduce the RF cell size and not demodulate radio packets above a given threshold? A. RX-SOP B. FRA C. 80211k D. RRM None 48. In a Cisco Mobility Express wireless deployment, which AP takes over if the primary AP fails? A. AP with highest IP address B. AP with the lowest IP address C. AP with highest MAC address D. AP with highest controller up time None 49. A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described? A. intra-VLAN B. inter-controller C. intra-controller D. inter-subnet None 50. Which JSON syntax is derived from this data? Person#1:First Name is JohnnyLast Name is TableHobbies are. Rumning Video games Person#2:First Name is BilyLast Name is SmithHobbies are: Napping Reading {[First Name':Johnny,Las:Name':“Table,Mobies':Running.Hobies'Vdeo ganes”.[Frst Nane'Baly,Lat Name?Smn;,Hobbles'Nappreg.Hobes:Reacing (Person:I[Frst Name:Jonny,Lat Name'Tabe:16obies:Runing:Vdeo gome].(Fr Name:BDy,Last Name:Smm:Hobies:Naping,Readng) (Persom:FEs Name:Jotnny,Last Name'Table.Hobes:Runing.Veo games].{Fust Name'Buy,Las Name:5m;,Hobles:[Napng.ReadingTy {[First Name':Johny,Las:Name:Tabe,Hobties:[Ruming.Video games].(Finst Name:Bily,Las Name:Smir,Hobies:Naping,Reading) None 51. Drag and drop the characteristics from the left onto the corresponding orchestration tool on the right. None 52. Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two.) A. custom headers B. authentication C. authorizatio D. request management E. accounting 53. Which function is performed by vSmart in the Cisco Catalyst SD-WAN architecture? A. facilitation of NAT detection and traversal B. redistribution between OMP and other routing protocols C. distribution of IPsec keys D. execution of localized policies None 54. Which character formatting is required for DHCP Option 43 to function with current AP models? A. ASCII B. Hex C. Base64 D. MD5 None 55. Which technique is used to protect end user devices and data from unknown file behavior? A. crypto file ransomware protection using a file hash calculation B. file retrospection using continuous scan and analyses C. phishing file quarantine using an internal environment to store attached files D. file sandboxing using a protected environment to analyze and simulate the behavior of unknown files None 56. What is determined from the output? A. 10.0.0.100 is managed by Cisco Catalyst Center (formerly DNA Center). B. The URL for the second query is syntactically incorrect. C. The authentication for the second query fails. D. 10.0.0.200 is known to DNA Center, but its ID is an empty string. None 57. What happens when a FlexConnect AP changes to standalone mode? A. All client roaming continues to work. B. All controller-dependent activities stop working except the DFS. C. Only clients on central switching WLANs stay connected. D. All clients on all WLANs are disconnected. None 58. Simulation 14 Solution: R1 config t flow record NetFlow-Record match ipv4 source address match ipv4 destination address collect country bytes flow exporter NetFlow-Exporter destination 10.10.1.10 transport udp 9996 flow monitor NetFlow-Monitor record NetFlow-Record exporter NetFlow-Exporter exit int et0/0 ip flow monitor NetFlow-Monitor input ip sla 1 http get http://10.10.1.100 frequency 600 exit ip sla schedule 1 start-time now wr Sw1 config t monitor session 2 source int e0/0 monitor session 2 source int et0/2 monitor session 2 destination interface e1/0 wr None 59. Which two protocols are used with YANG data models? (Choose two.) A. NETCONF B. RESTCONF C. SSH D. TLS E. HTTPS 60. An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement? A. RF B. WLAN C. Policy D. Flex None 61. What is a characteristic of VRRP? A. It inherently balances load amongst the available gateways. B. It ensures symmetric traffic flow upstream and downstream. C. It Is a Cisco proprietary protocol. D. It uses a virtual IP address and a virtual MAC address to achieve redundancy None 62. Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session? A. HTTP Status Code 200 B. HTTP Status Code 302 C. HTTP Status Code 401 D. HTTP Status Code: 504 None 63. A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement? A. Identity PSK B. Fast Transition C. Central Web Authentication D. Cisco Centralized Key Management None 64. An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WLAN Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on then OLTIs? A. over the DS B. adaptive R C. 802.11V D. 802.11k None 65. What is the role of the vSmart controller in a Cisco Catalyst SD-WAN environment? A. It is the centralized network management system. B. It manages the data plane. C. It manages the control plane. D. It performs authentication and authorization. None 66. Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis? A. Cisco Firepower and FireSIGHT B. Cisco Stealth watch system C. Advanced Malware Protection D. Cisco Web Security Appliance None 67. An engineer must adjust the configuration so that Router A becomes the active router. Which commands should be applied to router A? (Choose two) A. vrrp 1 priority 90 B. vrrp 1 timers advertise 1 C. vrrp lip 10.1.0.11 D. ip address 10.1.0.11 255.0.0.0 E. vrrp 1 priority 120 68. What is a benefit of data modeling languages like YANG? A. They enable programmers to change or write their own application within the device operating system. B. They create more secure and efficient SNMP OIDs. C. They make the CLI simpler and more efficient. D. They provide a standardized data structure, which results in configuration scalability and consistency. None 69. Which method displays text directly into the active console with a synchronous EEM applet policy? A. event manager applet boomevent syslog pattern 'UP'action 1.0 gets 'logging directly to console' B. event manager applet boomevent syslog pattern 'UP'action 1.0 syslog priority direct msg 'log directly to console' C. event manager applet boomevent syslog pattern 'UP'action 1.0 puts 'logging directly to console' D. event manager applet boomevent syslog pattern 'UP'action 1.0 string 'logging directly to console' None 70. Which LISP device is responsible for publishing EID-to-RLOC mappings for a site? A. ETR B. MS C. ITR D. MR None 71. Drag and drop the threat defense solutions from the left onto their descriptions on the right. A. None 72. POSTMAN is showing an attempt to retrieve network device information from Cisco Catalyst Center (formerly DNA Center) API. What is the issue? A. The token has expired B. The URI string is incorrect C. Authentication has failed D. The JSON payload contains the incorrect UUID None 73. Which feature works with SSO to continue forwarding packets after a route processor failure until the control plane recovers? A. ECMP B. HSRP C. RSVP D. NSF None 74. Which protocol does Cisco Catalyst Center (formerly DNA Center) SDK use to discover the topology of non-Cisco devices in a network? A. CDP B. LLDP C. Telnet D. SSH None 75. What is a characteristic of a traditional WAN? A. low complexity and high overall solution scale B. centralized reachability. security, and application policies C. operates over DTLS and TLS authenticated and secured tunnels D. unified data plane and control plane None 76. An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows: LocationA -72dBm Location B:-75 dBm Location C; -65 dBm Location D -80 dBm Which two statements does the engineer use to explain these values to the customer? (Choose two.) A. The signal strength at location B is 10 dB better than location C. B. The signal strength at location C is too weak to support web surfing C. Location D has the strongest RF signal strength. D. The RF signal strength at location B is 50% weaker than location A. E. The RF signal strength at location C is 10 times stronger than location B 77. What does this code achieve? A. It generates a list containing only the hostname of the LLDP neighbor. B. It generates a list of the LLDP neighbors and their capabilities C. It generates a list of routers with the Repeater capability. D. It generates a count of the LLDP neighbors. None 78. Which architectural component enables a zero-trust security model? A. management plane B. plug-and-play C. data plane D. control plane None 79. A company hires a network architect to design a new OTT wireless solution within a Cisco SDAccess Fabric wired network. The architect wants to register access points to the WLC to centrally switch the traffic. Which AP mode must the design include? A. Bridge B. Fabric C. FlexConnect D. local None 80. Why would an architect use an OSPF virtual link? A. to allow a stub area to transit another stub area B. to merge two existing Area 0s through a nonbackbone C. to connect two networks that have overlapping private IP address space D. to connect a nonbackbone area to Area 0 through another nonbackbone area None 81. A customer requires their wireless data traffic to egress at the switch port of the access point. Which access point mode supports this? A. Bridge B. Sniffer C. FlexConnect D. Monitor None 82. Assuming the WLC's interfaces are not in the same subnet as the RADIUS server, which interface would the WLC use as the source for all RADIUS-related traffic? A. the interface specified on the WLAN configuration B. any interface configured on the WLC C. the controller management interface D. the controller virtual interface None 83. Which two nodes comprise a collapsed core in a two-tier Cisco SD-Access design? (Choose two.) A. edge nodes B. distribution nodes C. extended nodes D. core nodes E. border nodes 84. What is the primary responsibility of the vBond orchestrator? A. to provide centralized management and provisioning of all elements into the network B. to configure NAT communication on WAN Edge routers C. to provide configuration synchronization of an WAN Edge devices D. to facilitate start-up by performing authentication and authorization of all elements into the network None 85. Which device makes the decision for a wireless client to roam? A. wireless client B. Wireless LAN controller C. access poin D. WCS location server None 86. What is a TLOC in a Cisco SD-WAN deployment? A. value that identifies a specific tunnel within the Cisco SD-WAN overlay B. identifier that represents a specific service offered by nodes within the Cisco SD-WAN overlay C. attribute that acts as a next hop for network prefixes D. component set by the administrator to differentiate similar nodes that offer a common service None 87. Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right. None 88. Which feature allows clients to perform Layer 2 roaming between wireless controllers? A. SSO B. N+1 high availably C. mobility groups D. RF grouping None 89. Simulation 11 Solution: None 90. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running config. Which command completes the configuration? A. Device(config)# netconf lock-time 500 B. Device(config)# netconf max-message 1000 C. Device(config)# no netconf ssh acl 1 D. Device(config)# netconf max-sessions 100 None 91. In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node? A. VXIAN B. IS-IS C. 802.1 D. CTS None 92. Which unit of measure is used to measure wireless RF SNR? A. mw B. dbm C. db D. dBi None 93. Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used A. None 94. Which action controls the maximum cell size in a high-density wireless environment? A. Statically set TX power on access points to max. B. Disable low data rates. C. Set mandatory data rates. D. Decrease TX power on access points. None 95. What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna? A. EIRP B. mW C. dBm D. dBi None 96. When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem? A. Not all of the controllers in the mobility group are using the same mobility group name. B. All of the controllers within the mobility group are using the same virtual Interface IP address. C. Not all of the controllers within the mobility group are using the same virtual interface IP address D. All of the controllers in the mobility group are using the same mobility group name None 97. Based on this JSON response: {"jsonrpc":"2.0","result":{"body":{"simple_time":"10:42:36.111 UTC Mon Jan 12024"}}} Which Python statement parses the response and prints "10:42:36.111 UTC Mon Jan 1 2024"? A.print(response['jsonrpc']['body']['simple_time') B.print(response['result'][O]['simple_time']) 400 C.print(response['result']['body']['simple_time']) D.print(response['body']['simple_time']) None 98. A corporate policy mandates that a certificate-based authentication system must be implemented on the wireless infrastructure. All corporate clients will contain a certificate that will be used in conjunction with ISE and user credentials to perform authentication before the clients are allowed to connect to the corporate Wi-Fi. Which authentication key option must be selected to ensure that this authentication can take place? A. none B. PSK C. 802.1x D. CCKM None 99. Which nodes require VXLAN encapsulation support In a Cisco SD-Access deployment? A. core nodes B. distribution nodes C. border node D. aggregation nodes None 100. Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right. A. None 101. Which configuration causes the traffic from PC-1 to the internet to use the link between CoreSW-1 and CoreSW-2 when both switches are up? A.CoreSW-2(config)#interface vlan 10CoreSW-2(config-if)#standby 10 priority 110 B.CoreSW-1(config)#interface vlan 10CoreSW-1(config-if)#standby 10 priority 90 C.CoreSW-1(config)#interface vlan 10CoreSW-1(config-if)#standby 10 priority 110 D.CoreSW-2(config)#interface vlan 10CoreSW-2(config-if)#standby 10 priority 100 None 102. What is the JSON syntax that is formed from the data? Make is GocarModel is ZoomFeatures are: Power Windows Auto AC Manual Drive A. Make”:‘Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]} B. 'Make ”: “Gocar1, “Model”: “Zoom”, “Features”: [“Power Windows”, “Manual Drive”, “Auto AC”] C. {“Make”: Gocar, “Model": Zoom, “Features": Power Windows, Manual Drive, Auto AC} D. (“Make”:[ “Gocar”, “Model": “Zoom"], Features”: [“Power Windows", “Manual Drive", “Auto AC”]} None 103. An engineer is troubleshooting an issue with non-Wi-Fi interference on the 5- GHz band The engineer has enabled Cisco CleanAir and set the appropriate traps, but the AP does not change the channel when it detects significant interference Which action will resolve the issue? A. Enable the Avoid Persistent Non-WiFi Interference option B. Disable the Avoid Foreign AP Interference option. C. Change the DCA Sensitivity option to High D. Enable the Event Driven Radio Resource Management option None 104. When deploying a Cisco Unified Wireless solution what is a design justification for using a distributed WLC deployment model? A. It reduces the number of WLCs that network administrators must support by locating them in a common location B. It more evenly distributes MAC ARP and ND processing over multiple switches which helps with scalability C. The number of wireless clients is low and the size of the physical campus is small D. There are no latency concerns about LWAPP and CAPWAP tunnels traversing the campus core network None 1 out of 104 Name Email Time is Up!