DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CCNP ENCOR 350-401 Practice Questions | Real Exam Preparation

Ensure your success in the CCNP ENCOR 350-401 exam by using real exam questions and answers designed to mirror the actual test. Our collection of practice questions covers key topics such as network infrastructure, virtualization, and automation, providing you with a realistic exam experience. By working through these test questions and answers, you’ll gain confidence in your skills and be fully prepared for the real exam. Our exam practice questions and practice exams allow you to assess your knowledge, track your progress, and identify areas needing improvement. Using our certification practice tests and exam preparation materials, you can optimize your study efforts and increase your chances of passing on your first attempt. Start your preparation today with our expertly crafted exam questions, and take a step closer to achieving your CCNP certification!
Take other online exams

Question #1
What is YANG used for?
A. craping data via CLI
B. rocessing SNMP read-only polls
C. escribing data models
D. roviding a transport for network configuration data between client and serve
View answer
Correct Answer: C
Question #2
Which technology is used as the basis for the Cisco SD-Access data plane?
A. Psec
B. ISP
C. XLAN
D. 02
View answer
Correct Answer: C
Question #3
What does a YANG model provide?
A. tandardized data structure independent of the transport protocols
B. reation of transport protocols and their interaction with the OS
C. ser access to interact directly with the CLI of the device to receive or modify network configurations
D. tandardized data structure that can be used only with NETCONF or RESTCONF transport protocol
View answer
Correct Answer: A
Question #4
What does the LAP send when multiple WLCs respond to the CISCO-CAPWAP- CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
A. ulticast discovery request
B. nicast discovery request to each WLC
C. oin request to all the WLCs
D. nicast discovery request to the first WLC that resolves the domain nam
View answer
Correct Answer: C
Question #5
An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement?
A. F
B. lex
C. LAN
D. olic
View answer
Correct Answer: C
Question #6
What is a benefit of YANG?
A. t enables multiple leaf statements to exist within a leaf list
B. t enforces the use of a specific encoding format for NETCONF
C. t collects statistical constraint analysis information
D. t enforces configuration semantics
View answer
Correct Answer: C
Question #7
What is a characteristic of an AP operating in FlexConnect mode?
A. ll traffic traverses the WLC to ensure policy enforcement on client traffic
B. orwarding for locally switched traffic continues when the AP loses connectivity to the WLC
C. Ps connect in a mesh topology and elect a root AP
D. lexConnect enables an AP to connect to multiple WLCs
View answer
Correct Answer: C
Question #8
If a client's radio device receives a signal strength of -67 dBm and the noise floor is -85 dBm, what is the SNR value?
A. 5dB
B. 6dB
C. 8dB
D. 0d
View answer
Correct Answer: D
Question #9
What is a characteristic of Cisco DNA southbound APIs?
A. nables orchestration and automation of network devices based on intent
B. mplements monitoring by using the SOAP protocol
C. tilizes REST API
D. implifies management of network device
View answer
Correct Answer: C
Question #10
What are two benefits of implementing a Cisco SD-WAN architecture?
A. t provides resilient and effective traffic flow using MPLS
B. t simplifies endpoint provisioning through standalone router management
C. t allows configuration of applicatlon-aware policies with real time enforcement
D. t enforces a single, scalable, hub-and-spoke topology
E. t improves endpoint protection by Integrating embedded and cloud security features
View answer
Correct Answer: A
Question #11
A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?
A. ound robin
B. east connection
C. eighted
D. ost dependen
View answer
Correct Answer: D
Question #12
High bandwidth utilization is occurring on interface Gig0/1 of a router. An engineer must identify the flows that are consuming the most bandwidth. Cisco DNA Center is used as a flow exporter and is configured with the IP address 192.168.23.1 and UDP port 23000. Which configuration must be applied to set NetFlow data export and capture on the router?
A. 1(config)# ip flow-export version 9
B. 1(config)# ip flow-export destination 192
C. 1(config-if)# ip flow ingress R1(config-if)# ip flow egress
D. 1(config)# ip flow-export version 9
E. 1(config)# ip flow-export destination 192
F. 1(config-if)# ip flow-top-talkers
G. 1(config)#ip flow-export
H. 1(config)# ip flow-export destination 192
View answer
Correct Answer: A
Question #13
In which two ways does TCAM differ from CAM?
A. AM is used by routers for IP address lookups, and TCAM is used to make Layer 2 forwarding decisions
B. he MAC address table is contained in CAM, and ACL and QoS information is stored in TCAM
C. AM is used for software switching mechanisms, and TCAM is used for hardware switching mechanisms
D. he MAC address table is contained in TCAM, and ACL and QoS information is stored in CAM
E. AM is used to make Layer 2 forwarding decisions, and TCAM is used for Layer 3 address lookups
View answer
Correct Answer: B
Question #14
How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?
A. dd a timestamp to the request in the API header
B. se a password hash
C. dd OAuth to the request in the API header
D. se HTTPS
View answer
Correct Answer: B
Question #15
A network engineer is designing a QoS policy for voice and video applications. Which software queuing feature provides strict-priority servicing?
A. utomatic QoS
B. ink Fragmentation
C. ow Latency Queuing
D. lass-Based Weighted Fair Queuin
View answer
Correct Answer: A
Question #16
A customer wants to use a single SSID to authenticate IoT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?
A. ast Transition
B. isco Centralized Key Management
C. dentity PSK
D. entral Web Authenticatio
View answer
Correct Answer: C
Question #17
An engineer configures a WLAN with fast transition enabled. Some legacy clients fail to connect to this WLAN. Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OUIs?
A. 02
B. daptive R
C. ver the DS
D. 02
View answer
Correct Answer: C
Question #18
What are two benefits of implementing a traditional WAN instead of an SD-WAN solution?
A. aster fault detection
B. ower data plane overhead
C. implified troubleshooting
D. ower control plane abstraction
E. omprehensive configuration standardizatio
View answer
Correct Answer: D
Question #19
What is the purpose of an integration API in Cisco DNA Center?
A. nable external systems to take actions in response to an event
B. nable discovery and control of the network by using HTTPS verbs
C. btain information about clients, sites, and topology from Cisco DNA Center
D. llow the platform into approval chains in ITSM
View answer
Correct Answer: CE
Question #20
Which resource must a hypervisor make available to the virtual machines?
A. andwidth
B. P address
C. torage
D. ecure acces
View answer
Correct Answer: B
Question #21
ip sla 100udp-echo 10.10.10.15 6336frequency 30Refer to the exhibit. An engineer has configured an IP SLA for UDP echos. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?
A. p sla schedule 30 start-time now life forever
B. p sla schedule 100 start-time now life 30
C. p sla schedule 100 start-time now life forever
D. p sla schedule 100 life foreve
View answer
Correct Answer: B
Question #22
Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic?
A. RF
B. LAN
C. NI
D. ridge domai
View answer
Correct Answer: BE
Question #23
Which Cisco DNA center application is responsible for group-based access control permissions?
A. esign
B. rovision
C. ssurance
D. olicy
E. UESTION 6
F. hen does Cisco DNA Center make changes to a device
G. hen the network device is discovered and device controllability is turned on
H. hen the device credentials are added
View answer
Correct Answer: D
Question #24
How does policy-based routing function?
A. HA-512 and SHA-384
B. HA-1, SHA-256, and SHA-512
C. D5 algorithm-128 and SHA-384
D. BKDF2, BCrypt, and SCryp
View answer
Correct Answer: C
Question #25
What is one difference between SaltStack and Ansible?
A. altStack uses an API proxy agent to program Cisco boxes in agent mode, whereas Ansible uses a Telnet connection
B. altStack is constructed with minion, whereas Ansible is constructed with YAML
C. altStack uses the Ansible agent on the box, whereas Ansible uses a Telnet server on the box
D. altStack uses SSH to interact with Cisco devices, whereas Ansible uses an event bus
View answer
Correct Answer: B
Question #26
Which two solutions are used for backing up a Cisco DNA Center Assurance database?
A. on-linux server
B. are metal server
C. ocal server
D. FS share
E. emote serve
View answer
Correct Answer: C
Question #27
Which QoS FIFO queuing strategy allows user-defined traffic classes based on input interface names or access lists and protocols?
A. Edge
B. Manage NMS
C. Bond orchestrator
D. Analytic
View answer
Correct Answer: A
Question #28
An engineer is describing QoS to a client. Which two facts apply to traffic policing?
A. olicing should be performed as close to the source as possible
B. olicing drops traffic that exceeds the defined rate
C. olicing typically delays the traffic, rather than drops it
D. olicing adapts to network congestion by queuing excess traffic
E. olicing should be performed as close to the destination as possible
View answer
Correct Answer: A
Question #29
Which action limits the total amount of memory and CPU that is used by a collection of VMs?
A. lace the collection of VMs in a vApp
B. imit the amount of memory and CPU that is available to the individual VMs
C. lace the collection of VMs in a resource pool
D. imit the amount of memory and CPU that is available to the cluster
View answer
Correct Answer: A
Question #30
What is the centralized control policy in a Cisco SD-WAN deployment?
A. ist of ordered statements that define user access policies
B. et of statements that defines how routing is performed
C. et of rules that governs nodes authentication within the cloud
D. ist of enabled services for all nodes within the clou
View answer
Correct Answer: A
Question #31
What does the Cisco DNA Center Authentication API provide?
A. ist of VLAN names
B. ist of global issues that are logged in Cisco DNA Center
C. lient health status
D. ccess token to make calls to Cisco DNA Cente
View answer
Correct Answer: A
Question #32
A network engineer must configure a router to send logging messages to a syslog server based on these requirements:uses syslog IP address: 10.10.10.1uses a reliable protocolmust not use any well-known TCP/UDP ports Which configuration must be used?
A. ogging host 10
B. ogging origin-id 10
C. ogging host 10
D. ogging host 10
View answer
Correct Answer: BD
Question #33
What is a fact about Cisco EAP-FAST?
A. t requires a client certificate
B. t is an IETF standard
C. t does not require a RADIUS server certificate
D. t operates in transparent mod
View answer
Correct Answer: D
Question #34
When a DNS host record is configured for a new Cisco AireOS WLC, which hostname must be added to allow APs to successfully discover the WLC?
A. APWAP-CISCO-CONTROLLER
B. ISCO-CAPWAP-CONTROLLER
C. ISCO-CONTROLLER-CAPWAP
D. ONTROLLER-CAPWAP-CISC
View answer
Correct Answer: AB
Question #35
Which Cisco SD-WAN component authenticates the routers and the vSmart controllers?
A. t processes traffic based on the destination IP address
B. t processes egress packets and changes the next hop based on the destination IP address
C. t processes packets entering an interface and overrides the logic in the routing table
D. t schedules traffic based on policies applied to queues
View answer
Correct Answer: D

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: