DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Excel in the Cisco 350-401 ENCOR Exam with Comprehensive Study Materials

Cisco 350-401 ENCOR exam questions are an essential resource for anyone preparing for the Cisco certification in Implementing and Operating Cisco Enterprise Network Core Technologies. This exam delves into crucial topics like network infrastructure, security, automation, and more, making it a comprehensive assessment of your skills in enterprise network technologies. By leveraging exam resources, study materials, and mock exams provided in this preparation guide, you'll gain a deep understanding of the exam objectives and hone your problem-solving abilities. The included exam questions and answers are designed to mimic the complexity and format of the actual test, allowing you to practice effectively and improve your exam performance. Successful passing of the Cisco 350-401 ENCOR exam opens up new career opportunities and validates your expertise in foundational networking concepts. With thorough exam preparation and strategic use of study materials, you'll be well-equipped to tackle test questions with confidence and achieve your Cisco certification goals. Start your journey to success today with this comprehensive exam preparation guide.
Take other online exams

Question #1
Which statement describes the IP and MAC allocation requirements for virtual machines on Type 1 hypervisors?
A. Virtual machines do not require a unique IP or unique MAC
B. Each virtual machine requires a unique IP address but shares the MAC address with the physical server
C. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes
D. Each virtual machine requires a unique MAC address but shares the IP address with the physical server
View answer
Correct Answer: C
Question #2
Refer to the exhibit. These commands have been added to the configuration of a switch.Which command flags an error if it is added to this configuration?
A. onitor session 1 source interface port-channel 6
B. onitor session 1 source vlan 10
C. onitor session 1 source interface FastEthemet0/1 rx
D. onitor session 1 source interface port-channel 7, port-channel 8
View answer
Correct Answer: B
Question #3
Which two security features are available when implementing NTP? (Choose two.)
A. symmetric server passwords
B. dock offset authentication
C. broadcast association mode
D. encrypted authentication mechanism
E. access list-based restriction scheme
View answer
Correct Answer: DE
Question #4
Refer to the exhibit. An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?
A. nable fast LACP PDUs on interface Gi0/0
B. et LACP max-bundle to 2 on interface Port-channel1
C. onfigure no shutdown on interface Gi0/0
D. onfigure channel-group 1 mode active on interface Gi0/0
View answer
Correct Answer: B
Question #5
At which layer does Cisco DNA Center support REST controls?
A. session layer
B. northbound APIs
C. EEM applets or scripts
D. YAML output from responses to API calls
View answer
Correct Answer: B
Question #6
Refer to the exhibit. An engineer must configure and validate a CoPP policy that allows the network management server to monitor router R1 via SNMP while protecting the control plane. Which two commands or command sets must be used? (Choose two.)
A. ine vty 0 15 login local transport input all
B. ine vty 0 15 login local transport input ssh
C. ine vty 0 15 login local transport input telnet ssh
D. ine vty 0 15 login local transport input none
View answer
Correct Answer: AE
Question #7
Refer to the exhibit. Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning-tree port-priority 32 command on G0/1 on SW2, but the port remains blocked.Which command should be entered on the ports that are connected to Link2 to resolve the issue?
A. nter spanning-tree port-priority 4 on SW2
B. nter spanning-tree port-priority 32 on SW1
C. nter spanning-tree port-priority 224 on SW1
D. nter spanning-tree port-priority 64 on SW2
View answer
Correct Answer: B
Question #8
Which OSPF network types are compatible and allow communication through the two peering devices?
A. he output displays OSPF hello messages which router R1 has sent or received on interface Fa0/1
B. he output displays all OSPF messages which router R1 has sent or received on all interfaces
C. he output displays all OSPF messages which router R1 has sent or received on interface Fa0/1
D. he output displays OSPF hello and LSACK messages which router R1 has sent or received
View answer
Correct Answer: B
Question #9
Which encryption hashing algorithm does NTP use for authentication?
A. SL
B. D5
C. ES128
D. ES256
View answer
Correct Answer: B
Question #10
What NTP stratum level is a server that is connected directly to an authoritative time source?
A. Stratum 0
B. Stratum 1
C. Stratum 14
D. Stratum 15
View answer
Correct Answer: B
Question #11
What are two reasons a company would choose a cloud deployment over an on-prem deployment? (Choose two.)
A. CAM is used to make L2 forwarding decisions
B. outer prefix lookups happen in CAM
C. he MAC address table supports partial matches
D. he MAC address table is contained in CAM
View answer
Correct Answer: AB
Question #12
Refer to the exhibit. An engineer configures a trunk between SW1 and SW2 but tagged packets are not passing. Which action fixes the issue?
A. onfigure SW1 with dynamic auto mode on interface FastEthernet0/1
B. onfigure the native VLAN to be the same VLAN on both switches on interface FastEthernet0/1
C. onfigure SW2 with encapsulation dot1q on interface FastEthernet0/1
D. onfigure FastEthernet0/1 on both switches for static trunking
View answer
Correct Answer: C
Question #13
Refer to the exhibit. R1 is able to ping the R3 fa0/1 interface. Why do the extended pings fail?
A. he maximum packet size accepted by the command is 1476 bytes
B. he DF bit has been set
C. 3 is missing a return route to 10
D. 2 and R3 do not have an OSPF adjacency
View answer
Correct Answer: B
Question #14
Which feature is supported by EIGRP but is not supported by OSPF?
A. route filtering
B. unequal-cost load balancing
C. route summarization
D. equal-cost load balancing
View answer
Correct Answer: B
Question #15
Refer to the exhibit. Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1?
A. nterface Ethernet0/0 ip address 172
B. nterface Ethernet0/0 vrf forwarding hotel ip address 172
C. nterface Ethernet0/0 vrf forwarding bank ip address 172
D. nterface Ethernet0/0 ip address 172
View answer
Correct Answer: C
Question #16
Which two methods are used to reduce the AP coverage area? (Choose two.)
A. atch
B. ipole
C. mnidirectional
D. agi
View answer
Correct Answer: BD
Question #17
By default, which virtual MAC address does HSRP group 22 use?
A. 0:41:99:98:06:16
B. 0:00:0c:07:ac:16
C. 0:00:0c:07:ac:22
D. 0:07:0c:ac:00:22
View answer
Correct Answer: B
Question #18
Refer to the exhibit. An engineer is investigating why guest users are able to access other guest user devices when the users are connected to the customer guestWLAN. What action resolves this issue?
A. mplement P2P blocking
B. mplement MFP client protection
C. mplement Wi-Fi direct policy
D. mplement split tunneling
View answer
Correct Answer: A
Question #19
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
A. SSL
B. Cisco TrustSec
C. MACsec
D. IPsec
View answer
Correct Answer: C
Question #20
Which benefit is realized by implementing SSO?
A. P first-hop redundancy
B. ommunication between different nodes for cluster setup
C. hysical link redundancy
D. inimal network downtime following an RP switchover
View answer
Correct Answer: D
Question #21
Which VXLAN component is used to encapsulate and decapsulate Ethernet frames?
A. NI
B. RE
C. TEP
D. VPN
View answer
Correct Answer: C
Question #22
Which component handles the orchestration plane of the Cisco SD-WAN?
A. Bond
B. Smart
C. Manage
D. AN Edge
View answer
Correct Answer: A
Question #23
Which statement about VXLAN is true?
A. VXLAN encapsulates a Layer 2 frame in an IP-UDP header, which allows Layer 2 adjacency across router boundaries
B. VXLAN uses the Spanning Tree Protocol for loop prevention
C. VXLAN extends the Layer 2 Segment ID field to 24-bits, which allows up to 4094 unique Layer 2 segments over the same network
D. VXLAN uses TCP as the transport protocol over the physical data center network
View answer
Correct Answer: A
Question #24
How does the RIB differ from the FIB?
A. he FIB maintains network topologies and routing tables
B. he FIB includes many routes to a single destination
C. he RIB is used to create network topologies and routing tables
D. he RIB includes many routes to the same destination prefix
View answer
Correct Answer: C
Question #25
Which time protocol offers security features and utilizes site-local IPv6 multicast addresses?
A. TPv3
B. TP IEEE 1588v1
C. TPv4
D. TP IEEE 1588v2
View answer
Correct Answer: C
Question #26
Refer to the exhibit. The trunk between Gig1/0/1 of switch SW2 and Gig1/0/1 of switch SW1 is not operational. Which action resolves this issue?
A. onfigure both interfaces to nonegotiate and ensure that the switches are in different VTP domains
B. onfigure both interfaces in dynamic auto DTP mode and ensure that the switches are in the same VTP domain
C. onfigure both interfaces in dynamic auto DTP mode and ensure that the switches are in different VTP domains
D. onfigure both interfaces in dynamic desirable DTP mode and ensure that the switches are in the same VTP domain
View answer
Correct Answer: D
Question #27
A customer wants to provide wireless access to contractors using a guest portal on Cisco ISE. The portal is also used by employees. A solution is implemented, but contractors receive a certificate error when they attempt to access the portal. Employees can access the portal without any errors.Which change must be implemented to allow the contractors and employees to access the portal?
A. nstall a trusted third-party certificate on the Cisco ISE
B. nstall an internal CA signed certificate on the Cisco ISE
C. nstall a trusted third-party certificate on the contractor devices
D. nstall an internal CA signed certificate on the contractor devices
View answer
Correct Answer: A
Question #28
Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session?
A. TTP Status Code: 200
B. TTP Status Code: 302
C. TTP Status Code: 401
D. TTP Status Code: 504
View answer
Correct Answer: C
Question #29
Why would an engineer use YANG?
A. he SNMP interface index changed after reboot
B. he SNMP server traps are disabled for the link state
C. he SNMP server traps are disabled for the interface index
D. he SNMP community is configured incorrectly
View answer
Correct Answer: B
Question #30
What is a characteristic of a Type 2 hypervisor?
A. t eliminates the need for an underlying operating system
B. roblems in the base operating system can affect the entire system
C. ts main task is to manage hardware resources between different operating systems
D. t is completely independent of the operating system
View answer
Correct Answer: B
Question #31
Based on the output below, which Python code shows the value of the "upTime" key?
A. son_data = response
B. son_data = response
C. son_data = json
D. son_data = response
View answer
Correct Answer: A
Question #32
Refer to the exhibit. What is the JSON syntax that is formed from the data?
A. Name: Bob, Johson, Age: 75, Alive: true, Favourite Foods
B. Name”, ”Bob” Johson”, ”Age”, 75, ”Alive”, true, ”favourite Foods”, [”Cereal, ”Mustard”, Onions”]}
C. “Name”: “Bob Johnson”,“Age”: 75,“Alive”: “true”,“Favorite Foods”: [“Cereal”,“Mustard”,“Onions”]}
D. Name”
View answer
Correct Answer: C
Question #33
Refer to the exhibit. Which command must be applied to R2 for an OSPF neighborship to form?
A. etwork 20
B. etwork 20
C. etwork 20
D. etwork 20
View answer
Correct Answer: B
Question #34
Refer to the exhibit. The administrator troubleshoots an EtherChannel that keeps moving to err-disabled. Which two actions must be taken to resolve the issue?(Choose two.)
A. evice(config)# netconf max-sessions 100
B. evice(config)# no netconf ssh acl 1
C. evice(config)# netconf lock-time 500
D. evice(config)# netconf max-message 1000
View answer
Correct Answer: BE
Question #35
A client with IP address 209.165.201.25 must access a web server on port 80 at 209.165.200.225. To allow this traffic, an engineer must add a statement to an access control list that is applied in the inbound direction on the port connecting to the web server.Which statement allows this traffic?
A. ermit tcp host 209
B. ermit tcp host 209
C. ermit tcp host 209
D. ermit tcp host 209
View answer
Correct Answer: D
Question #36
Which requirement for an Ansible-managed node is true?
A. It must have an SSH server running
B. It must be a Linux server or a Cisco device
C. It must support ad hoc commands
D. It must have an Ansible Tower installed
View answer
Correct Answer: A
Question #37
What is the purpose of an RP in PIM?
A. end join messages toward a multicast source SPT
B. nsure the shortest path from the multicast source to the receiver
C. eceive IGMP joins from multicast receivers
D. ecure the communication channel between the multicast sender and receiver
View answer
Correct Answer: A
Question #38
Which statement about Cisco Express Forwarding is true?
A. he CPU of a router becomes directly involved with packet-switching decisions
B. t uses a fast cache that is maintained in a router data plane
C. t maintains two tables in the data plane: the FIB and adjacency table
D. t makes forwarding decisions by a process that is scheduled through the IOS scheduler
View answer
Correct Answer: C
Question #39
Refer to the exhibit. An engineer must permit traffic from these networks and block all other traffic. An informational log message should be triggered when traffic enters from these prefixes. Which access list must be used?
A. ccess-list acl_subnets permit ip 10
B. ccess-list acl_subnets permit ip 10
C. ccess-list acl_subnets permit ip 10
D. ccess-list acl_subnets permit ip 10
View answer
Correct Answer: C
Question #40
How does Protocol Independent Multicast function?
A. n sparse mode, it establishes neighbor adjacencies and sends hello messages at 5-second intervals
B. t uses the multicast routing table to perform the multicast forwarding function
C. t uses unicast routing information to perform the multicast forwarding function
D. t uses broadcast routing information to perform the multicast forwarding function
View answer
Correct Answer: C
Question #41
Refer to the exhibit. An engineer reconfigures the port-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1's log:*Mar 1 09:47:22.245: %PM-4-ERR_DISABLE: bpduguard error detected on Gi0/0, putting Gi0/0 in err-disable stateWhich command set resolves this error?
A. W1(config-if)#interface Gi0/0 SW1(config-if)#no spanning-tree bpdufilter SW1(config-if)#shut SW1(config-if)#no shut
B. W1(config-if)#interface Gi0/0 SW1(config-if)#no spanning-tree bpduguard enable SW1(config-if)#shut SW1(config-if)#no shut
C. W1(config-if)#interface Gi0/0 SW1(config-if)#spanning-tree bpduguard enable SW1(config-if)#shut SW1(config-if)#no shut
D. W1(config-if)#interface Gi0/1 SW1(config-if)#spanning-tree bpduguard enable SW1(config-if)#shut SW1(config-if)#no shut
View answer
Correct Answer: B
Question #42
Refer to the exhibit.?What are two effects of this configuration? (Choose two.)
A. It establishes a one-to-one NAT translation
B. The 209
C. The 10
D. Inside source addresses are translated to the 209
E. The 10
View answer
Correct Answer: CD
Question #43
A response code of 404 is received while using the REST API on Cisco DNA Center to POST to this URI:/dna/intent/api/v1/template-programmer/projectWhat does the code mean?
A. he POST/PUT request was fulfilled and a new resource was created
B. he request was accepted for processing, but the processing was not completed
C. he client made a request for a resource that does not exist
D. he server has not implemented the functionality that is needed to fulfill the request
View answer
Correct Answer: C
Question #44
Which PAgP mode combination prevents an EtherChannel from forming?
A. uto/desirable
B. esirable/desirable
C. esirable/auto
D. uto/auto
View answer
Correct Answer: D
Question #45
What are two benefits of virtual switching when compared to hardware switching? (Choose two.)
A. t must run the same operating system as its host
B. t is deployable without a hypervisor to host it
C. t must be aware of other virtual machines, in order to allocate physical resources for them
D. t relies on hypervisors to allocate computing resources for it
View answer
Correct Answer: DE
Question #46
Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?
A. ETR
B. MR
C. ITR
D. MS
View answer
Correct Answer: A
Question #47
Which DNS lookup does an access point perform when attempting CAPWAP discovery?
A. CISCO-CONTROLLER
B. CAPWAP-CONTROLLER
C. CISCO-CAPWAP-CONTROLLER
D. CISCO-DNA-CONTROLLER
View answer
Correct Answer: C
Question #48
Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings?
A. Command Runner
B. Template Editor
C. Application Policies
D. Authentication Template
View answer
Correct Answer: B
Question #49
Which two descriptions of FlexConnect mode for Cisco APs are true?(Choose two.)
A. APs that operate in FlexConnect mode cannot detect rogue APs
B. FlexConnect mode is used when the APs are set up in a mesh environment and used to bridge between each other
C. FlexConnect mode is a feature that is designed to allow specified CAPWAP-enabled APs to exclude themselves from managing data traffic between clients
and infrastructure.
D. When connected to the controller, FlexConnect APs can tunnel traffic back to the controller
E. FlexConnect mode is a wireless solution for branch office and remote office deployments
View answer
Correct Answer: DE
Question #50
What is the recommended minimum SNR for voice applications on wireless networks?
A. 0
B. 5
C. 0
D. 5
View answer
Correct Answer: D
Question #51
Which feature must be configured to allow packet capture over Layer 3 infrastructure?
A. RSPAN
B. ERSPAN
C. VSPAN
D. IPSPAN
View answer
Correct Answer: B
Question #52
What is the data policy in a Cisco SD-WAN deployment?
A. ist of ordered statements that define node configurations and authentication used within the SD-WAN overlay
B. et of statements that defines how data is forwarded based on IP packet information and specific VPNs
C. etailed database mapping several kinds of addresses with their corresponding location
D. roup of services tested to guarantee devices and links liveliness within the SD-WAN overlay
View answer
Correct Answer: B
Question #53
DRAG DROP (Drag and Drop is not supported)Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #54
Which two threats does AMP4E have the ability to block? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: CE
Question #55
Which statement about a fabric access point is true?
A. It is in local mode and must be connected directly to the fabric edge switch
B. It is in local mode and must be connected directly to the fabric border node
C. It is in FlexConnect mode and must be connected directly to the fabric border node
D. It is in FlexConnect mode and must be connected directly to the fabric edge switch
View answer
Correct Answer: A
Question #56
Which control plane protocol is used between Cisco SD-WAN routers and vSmart controllers?
A. CP
B. MP
C. DP
D. GP
View answer
Correct Answer: B
Question #57
Refer to the exhibit. What does the output confirm about the switch's spanning tree configuration?
A. he spanning-tree operation mode for this switch is PVST
B. he spanning-tree operation mode for this switch is PVST+
C. he spanning-tree mode stp ieee command was entered on this switch
D. he spanning-tree operation mode for this switch is IEEE
View answer
Correct Answer: B
Question #58
A customer has several small branches and wants to deploy a Wi-Fi solution with local management using CAPWAP. Which deployment model meets this requirement?
A. local mode
B. autonomous
C. SD-Access wireless
D. Mobility Express
View answer
Correct Answer: A
Question #59
Based on this interface configuration, what is the expected state of OSPF adjacency?
A. WAY/DROTHER on both routers
B. ot established
C. ULL on both routers
D. ULL/BDR on R1 and FULL/BDR on R2
View answer
Correct Answer: B
Question #60
By default, which virtual MAC address does HSRP group 16 use?
A. 0:41:41:43:07:10
B. 0:05:5c:07:0c:16
C. 0:00:0c:07:ac:10
D. 5:00:0c:07:ac:16
View answer
Correct Answer: C
Question #61
What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
A. broadcast discover request
B. join request to all the WLCs
C. unicast discovery request to each WLC
D. Unicast discovery request to the first WLC that resolves the domain name
View answer
Correct Answer: C
Question #62
What mechanism does PIM use to forward multicast traffic?
A. PIM sparse mode uses a pull model to deliver multicast traffic
B. PIM dense mode uses a pull model to deliver multicast traffic
C. PIM sparse mode uses receivers to register with the RP
D. PIM sparse mode uses a flood and prune model to deliver multicast traffic
View answer
Correct Answer: A
Question #63
Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verify the configuration. What does the output confirm?
A. he first packet triggered NAT to add an entry to the NAT table
B. 1 is configured with NAT overload parameters
C. Telnet session from 160
D. 1 is configured with PAT overload parameters
View answer
Correct Answer: A
Question #64
Refer to the exhibit.Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three switches. An administrator has noticed that VLAN 10 has propagated to SW3.Which configuration corrects the issue?
A. W1(config)#int gi1/1 SW1(config)#switchport trunk allowed vlan 1-9,11-4094
B. W2(config)#int gi1/2 SW2(config)#switchport trunk allowed vlan 10
C. W2(config)#int gi1/2 SW2(config)#switchport trunk allowed vlan 1-9,11-4094
D. W1(config)#int gi1/1 SW1(config)#switchport trunk allowed vlan 10
View answer
Correct Answer: C
Question #65
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?
A. security group tag ACL assigned to each port on a switch
B. security group tag number assigned to each user on a switch
C. security group tag number assigned to each port on a network
D. security group tag ACL assigned to each router on a network
View answer
Correct Answer: B
Question #66
Which two entities are Type 1 hypervisors? (Choose two)
A. Oracle VM Virtual Box
B. Microsoft Hyper-V
C. VMware server
D. VMware ESX
E. Microsoft Virtual PC
View answer
Correct Answer: BD
Question #67
Which two namespaces does the LISP network architecture and protocol use? (Choose two)
A. TLOC
B. RLOC
C. DNS
D. VTEP
E. EID
View answer
Correct Answer: BE
Question #68
When a wired client connects to an edge switch in an SDA fabric, which component decides whether the client has access to the network?
A. control-plane node
B. Identity Service Engine
C. RADIUS server
D. edge node
View answer
Correct Answer: B
Question #69
A client device fails to see the enterprise SSID, but other client devices are connected to it. What is the cause of this issue?
A. The client has incorrect credentials stored for the configured broadcast SSID
B. The hidden SSID was not manually configured on the client
C. The broadcast SSID was not manually configured on the client
D. The client has incorrect credentials stored for the configured hidden SSID
View answer
Correct Answer: B
Question #70
Refer to the exhibit. Which command allows hosts that are connected to FastEthernet0/2 to access the Internet?
A. p nat inside source list 10 interface FastEthernet0/2 overload
B. p nat inside source list 10 interface FastEthernet0/1 overload
C. p nat outside source static 209
D. p nat outside source list 10 interface FastEthernet0/2 overload
View answer
Correct Answer: B
Question #71
Which deployment option of Cisco NGFW provides scalability?
A. nline tap
B. igh availability
C. lustering
D. ap
View answer
Correct Answer: C
Question #72
An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use? event manager applet LogMessage event routing network 172.30.197.0/24 type all
A. ction 1 syslog msg ג€OSPF ROUTING ERRORג€
B. ction 1 syslog send ג€OSPF ROUTING ERRORג€
C. ction 1 syslog pattern ג€OSPF ROUTING ERRORג€
D. ction 1 syslog write ג€OSPF ROUTING ERRORג€
View answer
Correct Answer: A
Question #73
How does Cisco TrustSec enable more flexible access controls for dynamic networking environments and data centers?
A. uses flexible NetFlow
B. assigns a VLAN to the endpoint
C. classifies traffic based on advanced application recognition
D. classifies traffic based on the contextual identity of the endpoint rather than its IP address
View answer
Correct Answer: D
Question #74
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?
A. DP jitter
B. CMP jitter
C. CP connect
D. CMP echo
View answer
Correct Answer: A
Question #75
Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?
A. LBP
B. SRP v2
C. RRP
D. SRP v1
View answer
Correct Answer: A
Question #76
DRAG DROP (Drag and Drop is not supported)Drag and drop the characteristics from the left onto the switching mechanisms they describe on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #77
DRAG DROP (Drag and Drop is not supported)Drag and drop the characteristics from the left onto the orchestration tools they describe on the right.Select and Place:
A. se the Ixml library to parse the data returned by the NETCONF server for the interface's configuration
B. reate an XML filter as a string and pass it to get_config() method as an argument
C. reate a JSON filter as a string and pass it to the get_config() method as an argument
D. se the JSON library to parse the data returned by the NETCONF server for the interface's configuration
View answer
Correct Answer: A
Question #78
Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)
A. eighted fair
B. ustom
C. ow latency
D. riority
View answer
Correct Answer: BC
Question #79
A local router shows an EBGP neighbor in the Active state. Which statement is true about the local router?
A. The local router is attempting to open a TCP session with the neighboring router
B. The local router is receiving prefixes from the neighboring router and adding them in RIB-IN
C. The local router has active prefixes in the forwarding table from the neighboring router
D. The local router has BGP passive mode configured for the neighboring router
View answer
Correct Answer: A
Question #80
How is MSDP used to interconnect multiple PIM-SM domains?
A. SDP allows a rendezvous point to dynamically discover active sources outside of its domain
B. SDP SA request messages are used to request a list of active sources for a specific group
C. SDP depends on BGP or multiprotocol BGP for interdomain operation
D. SDP messages are used to advertise active sources in a domain
View answer
Correct Answer: C
Question #81
Which controller is the single plane of management for Cisco SD-WAN?
A. vBond
B. vSmart
C. vManage
D. vEdge?
View answer
Correct Answer: C
Question #82
Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?
A. Option 43
B. Option 60
C. Option 67
D. Option 150
View answer
Correct Answer: A
Question #83
By default, which virtual MAC address does HSRP group 32 use?
A. 4:19:01:05:2e:32
B. 5:5e:5c:ac:0c:32
C. 0:00:0c:07:ac:20
D. 0:5e:0c:07:ac:20
View answer
Correct Answer: C
Question #84
DRAG DROP (Drag and Drop is not supported)Drag and drop the characteristics from the left onto the deployment types on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #85
Which standard access control entry permits traffic from odd-numbered hosts in the 10.0.0.0/24 subnet?
A. ermit 10
B. ermit 10
C. ermit 10
D. ermit 10
View answer
Correct Answer: B
Question #86
Which privilege level is assigned to VTY users?
A. 1
B. 7
C. 13
D. 15
View answer
Correct Answer: A
Question #87
Refer to the exhibit. A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).
A. ultiple virtual servers can be deployed on the same physical server without having to buy additional hardware
B. irtual machines increase server processing performance
C. he CPU and RAM resources on a virtual machine cannot be affected by other virtual machines
D. eploying a virtual machine is technically less complex than deploying a physical server
View answer
Correct Answer: CD
Question #88
Which PAgP mode combination prevents an EtherChannel from forming?
A. auto/desirable
B. desirable/desirable
C. desirable/auto
D. auto/auto
View answer
Correct Answer: D
Question #89
When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?
A. Not all of the controllers in the mobility group are using the same mobility group name
B. Not all of the controllers within the mobility group are using the same virtual interface IP address
C. All of the controllers within the mobility group are using the same virtual interface IP address
D. All of the controllers in the mobility group are using the same mobility group name
View answer
Correct Answer: B
Question #90
To increase total throughput and redundancy on the links between the wireless controller and switch, the customer enabled LAG on the wireless controller. Which EtherChannel mode must be configured on the switch to allow the WLC to connect?
A. Active
B. Passive
C. On
D. Auto
View answer
Correct Answer: C
Question #91
What does the Cisco DNA Center use to enable the delivery of applications through a network and to yield analytics for innovation?
A. process adapters
B. Command Runner
C. intent-based APIs
D. domain adapters
View answer
Correct Answer: C
Question #92
An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group.Which command set is required to complete this task?interface GigabitEthernet0/1ip address 10.10.10.2 255.255.255.0vrrp 115 ip 10.10.10.1vrrp 115 authentication 407441579
A. outer(config if)# vrrp 115 track 1 decrement 100 Router(config-if)# vrrp 115 pre-empt
B. outer(config-if)# vrrp 115 priority 100
C. outer(config-if)# vrrp 115 track 1 decrement 10 Router(config-if)# vrrp 115 pre-empt
D. outer(config-if)# standby 115 priority 100 Router(config-if)# standby 115 pre-empt
View answer
Correct Answer: B
Question #93
Which NGFW mode blocks flows crossing the firewall?
A. ap
B. nline
C. assive
D. nline tap
View answer
Correct Answer: B
Question #94
A client device roams between wireless LAN controllers that are mobility peers. Both controllers have dynamic interfaces on the same client VLAN. Which type of roam is described?
A. ntra-VLAN
B. nter-controller
C. ntra-controller
D. nter-subnet
View answer
Correct Answer: B
Question #95
What is calculated using the numerical values of the transmitter power level, cable loss, and antenna gain?
A. EIRP
B. dBi
C. RSSI
D. SNR
View answer
Correct Answer: A
Question #96
Refer to the exhibit. Which router is the designated router on the segment 192.168.0.0/24?
A. his segment has no designated router because it is a p2p network type
B. outer Chicago because it has a lower router ID
C. outer NewYork because it has a higher router ID
D. his segment has no designated router because it is a nonbroadcast network type
View answer
Correct Answer: A
Question #97
What are two device roles in Cisco SD-Access fabric? (Choose two.)
A. t performs authentication and authorization
B. t manages the control plane
C. t is the centralized network management system
D. t manages the data plane
View answer
Correct Answer: AE
Question #98
Which outcome is achieved with this Python code?client.connect (ip, port= 22, username= usr, password= pswd ) stdin, stdout, stderr = client.exec_command ( 'show ip bgp 192.168.101.0 bestpath\n ' ) print (stdout)
A. onnects to a Cisco device using SSH and exports the BGP table for the prefix
B. isplays the output of the show command in a formatted way
C. onnects to a Cisco device using SSH and exports the routing table information
D. onnects to a Cisco device using Telnet and exports the routing table information
View answer
Correct Answer: A
Question #99
DRAG DROP (Drag and Drop is not supported)Drag and drop the threat defense solutions from the left onto their descriptions on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #100
In a Cisco DNA Center Plug and Play environment, why would a device be labeled unclaimed?
A. rocess adapters
B. ommand Runner
C. ntent-based APIs
D. omain adapters
View answer
Correct Answer: A
Question #101
Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch 1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected to swich2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two.)
A. rovides fabric extension to nonfabric devices through remote registration and configuration
B. erforms tunneling between fabric and nonfabric devices to route traffic over unknown networks
C. sed to extend the fabric connecting to downstream nonfabric enabled Layer 2 switches
D. n charge of establishing Layer 3 adjacencies with nonfabric unmanaged node
View answer
Correct Answer: AB
Question #102
Which statement describes the IP and MAC allocation requirements for virtual machines on Type 1 hypervisors?
A. Virtual machines do not require a unique IP or unique MAC
B. Each virtual machine requires a unique IP address but shares the MAC address with the physical server
C. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes
D. Each virtual machine requires a unique MAC address but shares the IP address with the physical server
View answer
Correct Answer: C
Question #103
Which three resources must the hypervisor make available to the virtual machines? (Choose three.)
A. ee Explanation section for answer
View answer
Correct Answer: ADE
Question #104
Refer to the exhibit. Which command set changes the neighbor state from Idle (Admin) to Active?
A. 1(config)#router bgp 65001 R1(config-router)#neighbor 192
B. 1(config)#router bgp 65001 R1(config-router)#neighbor 192
C. 1(config)#router bgp 65001 R1(config-router)#no neighbor 192
D. 1(config)#router bgp 65002 R1(config-router)#neighbor 192
View answer
Correct Answer: C
Question #105
Which statement about TLS is true when using RESTCONF to write configurations on network devices?
A. It is used for HTTP and HTTPS requests
B. It requires certificates for authentication
C. It is provided using NGINX acting as a proxy web server
D. It is not supported on Cisco devices
View answer
Correct Answer: C
Question #106
Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?
A. irtualization
B. upported systems
C. torage capacity
D. fficient scalability
View answer
Correct Answer: D

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: