350-401 ENCOR:Implementing Cisco Enterprise Network Core Technologies
Update:2026年4月18日
Questions and Answers: 376 Q&A
1.
In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?
2.
Drag and drop the code snippets from the bottom onto the blanks in the Python script to convert a Python object into a JSON string. Not all options are used.
3.
Drag and drop the characteristics from the left onto the orchestration tools they describe on the right.
4.
An engineer attempts to connect to another device from Route1’s console port. Which configuration is needed to allow telnet connections?
Router1#telnet 192.168.1.1
%telnet connections not pemitted from this terminal
5.
What is one advantage of using a data modeling language to develop an API client application?
6.
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
7.
Which unit measures the power of a radio signal with reference to 1 milliwatt?
8.
What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?
9.
Which method requires a client to authenticate and has the capability to function without encryption?
10.
Why would a network engineer configure an AP in SE-Connect mode?
11.
Which message type is valid for IGMPv3?
12.
With IGMPv2, which multicast group address does the IGMP querier use to send query messages to all hosts on the LAN?
13.
Which action reduces sticky clients in dense RF environments?
14.
What does the error message relay to the administrator who is trying to configure a Cisco IOS device?
15.
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?
16.
Drag and drop the REST API authentication methods from the left onto their descriptions on the right.
17.
Drag and drop the command snippets from the right onto the blanks in the configuration to create an EEM applet that will enable interface Loopback0 and log a message when the logging message -Interface Loopback0. changed state to administratively down" is received. Not all commands are used.
18.
Which language defines the structure or modelling of data for NETCONF and RESTCONF?
19.
What is used to measure the total output energy of a Wi-Fi device?
20.
What is a benefit of implementing stateful switchover?
21.
Which antenna type should be used for a site-to-site wireless connection?
22.
What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?
24.
Which two pieces of information are necessary to compute SNR? (Choose two.)
26.
What is the data policy in a Cisco SD-WAN deployment?
27.
Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.
30.
What is a characteristic of Layer 3 roaming?
31.
What is the value of the variable list after the code is run?
list =[1,2]
list =list*3.
print(List).
32.
What is the structure of a JSON web token?
33.
Which python code snippet prints the descriptions of disabled interface only?
>>>netconf_data["GigabitEthernet"][O]["enabled"]u'false'
>>>netconf_data"GigabitEthernet"[1]["enabled"]u'true'
>>>netconf_data["GigabitEthernet"][2]["enabled"]u'false'
>>>netconf_data["GigabitEthernet"[O]["description"]u'my description'
34.
Which technology collects location information through data packets received by the APs instead of using mobile device probes?
35.
Which method displays text directly into the active console with a synchronous EEM applet policy?
36.
How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?
37.
What does the LAP send when multiple WLCs respond to the CISCO_CAPWAPCONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
38.
An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:
Until interrupted from the keyboard, the script reads in the hostname of a device, its management
IP address, operating system type, and CLI remote access protocol.
After being interrupted, the script displays the entered entries and adds them to the JSON
formatted file, replacing existing entries whose hostname matches.
The contents of the JSON-formatted file are as follows

Drag and drop the statements onto the blanks within the code to complete the script. Not all
options are used.

39.
Where is radio resource management performed in a Cisco SD-Access wireless solution?
41.
When should the MAC authentication bypass feature be used on a switch port?
42.
Which two characteristics apply to Type 1 hypervisors? (Choose two.)
43.
A network administrator is preparing a Python script to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running. Which operation of the NC client manager prevents colleagues from making changes to the devices while the script is running?
44.
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
45.
Which authorization framework gives third-party applications limited access to HTTP services?
46.
How does SSO work with HSRP to minimize network disruptions?
47.
A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?
48.
In a Cisco SD-Access network architecture, which access layer cabling design is optimal for the underlay network?
49.
A company recently decided to use RESTCONF instead of NETCONF. and many of their NETCONF scripts contain the operation (operation-create). Which RESTCONF operation must be used to replace these statements?
50.
Which JSON syntax is derived from this data?
Person#1:First Name is JohnnyLast Name is TableHobbies are.
Person#2:First Name is BilyLast Name is SmithHobbies are:
51.
A customer reports occasional brief audio dropouts on its Cisco Wi-Fi phones. The environment consists of a Cisco Catalyst 9800 Series WLC with Catalyst 9120 APs running RRM. The phones connect on the 5-GHz band. Which action resolves this issue?
52.
The key value pairs must be extracted by iterating through a list of tuples. Which statement completes the snippet and prints each key value pair as a tuple?
53.
What is determined from the output?
54.
What is a TLOC in a Cisco Catalyst SD-WAN deployment?
55.
In a high-density AP environment, which feature can be used to reduce the RF cell size and not demodulate radio packets above a given threshold?
56.
Which controller is the single plane of management for Cisco SD-WAN?
57.
Which design principle states that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
58.
An engineer is installing a new pair of routers in a redundant configuration. Which protocol ensures that traffic is not disrupted in the event of a hardware failure?
59.
Which two components are needed when a Cisco SD-Access fabric is designed? (Choose two.)
60.
A client requests a new SSID that will use web-based authentication and external RADIUS servers. Which Layer 2 security mode must be selected?
61.
Authentication for users must first use RADIUS, and fall back to the local database on the router if the RADIUS server is unavailable Which two configuration sets are needed to achieve this result? (Choose two.)
62.
Which mechanism is used to protect the confidentiality of sensitive information exchanged over REST APIs?
63.
Drag and drop the code snippets from the bottom onto the blanks in the Python script to print the device model to the screen and write JSON data to a file. Not all options are used
64.
Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used.
65.
Which device makes the decision for a wireless client to roam?
66.
Which DNS record type is needed to allow a Cisco AP to discover a WLC when using IPv4?
67.
Which method ensures the confidentiality of data exchanged over a REST API?
68.
An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required?
69.
At which plane does vBond operate in Cisco SD-WAN solutions?
70.
Which feature works with SSO to continue forwarding packets after a route processor failure until the control plane recovers?
71.
To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?
72.
Why is a Type 1 hypervisor more efficient than a Type 2 hypervisor?
73.
What are two benefits of using Cisco TrustSec? (Choose two.)
74.
Which security feature does stateless authentication and authorization use for REST API calls?
75.
Drag and drop the command snippets from the right onto the boxes to create an EEM applet that will enable interface LoopbackO when the logging message 'Interface Loopback0. changed state to administratively down" is received. Not all commands are used and some commands are used more than once.
76.
Which method is used by an AP to join HA controllers and is configured in NVRAM?
77.
What are two best practices when designing a campus Layer 3 infrastructure? (Choose two.)
78.
Which two southbound interfaces originate from Cisco Catalyst Center (formerly DNA Center) and terminate at fabric underlay switches'? (Choose two.)
79.
Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two.)
80.
Why would an architect use an OSPF virtual link?
81.
Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?
82.
Which characteristic applies to Cisco SD-Access?
83.
POSTMAN is showing an attempt to retrieve network device information from Cisco Catalyst Center (formerly DNA Center) API. What is the issue?
84.
A company hires a network architect to design a new OTT wireless solution within a Cisco SDAccess Fabric wired network. The architect wants to register access points to the WLC to centrally switch the traffic. Which AP mode must the design include?
85.
Which definition describes JWT in regard to REST API security?
86.
Which feature is offered by the Cisco Advanced Malware Protection for Endpoints solution?
87.
Which two namespaces does the LISP network architecture and protocol use? (Choose two.)
88.
An engineer must configure a new 6 Ghz only SSID on a cisco catalyst 9800 series WLC, with these requirements:
Provide 802.11ax data rates for supported devices
All users authenticate using a certificate
Which wireless layer 2 security mode meets the requirements?
89.
How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?
90.
An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?
91.
A customer has two Cisco WLCs that manage separate APs throughout a building. Each WLC advertises the same SSID but terminates on different interfaces. Users report that they drop their connections and change IP addresses when roaming. Which action resolves this issue?
92.
What is a characteristic of VXLAN?
93.
Which function is performed by vSmart in the Cisco Catalyst SD-WAN architecture?
94.
What is two characteristic of Cisco DNA Center and vManage northbound APIs?(choose two)
95.
What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?
96.
In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)
97.
What are two device roles in Cisco SD-Access fabric? (Choose two.)
98.
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violates Which term refers to this REST security design principle?
99.
What does the snippet of code achieve?
with manager.connect(host=192.168.0.1,port=22,
username='admin,password='password1',hostkey_verify=True,
device_params={name'nexus'})asm:
100.
What does a next-generation firewall that is deployed at the data center protect against?
101.
What is a TLOC in a Cisco SD-WAN deployment?
102.
Which First Hop Redundancy Protocol should be used to meet a design requirements for more efficient default bandwidth usage across multiple devices?
103.
Which task Is mandatory when provisioning a device through the plug-and-play workflow in Cisco DNA Center?
104.
Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request that configures a deny rule on an access list?