350-401 Dumps

350-401 Braindumps

350-401 Real Questions

350-401 Practice Test

350-401 Actual Questions


killexams.com


Cisco


350-401


Implementing Cisco Enterprise Network Core Technologies (ENCOR)


https://killexams.com/pass4sure/exam-detail/350-401


Question: 924


Which method displays text directly into the active console with a synchronous EEM applet policy?

  1. event manager applet boom event syslog pattern ‘UP’

    action 1.0 gets ‘logging directly to console’

  2. event manager applet boom event syslog pattern ‘UP’

    action 1.0 syslog priority direct msg ‘log directly to console’

  3. event manager applet boom event syslog pattern ‘UP’

    action 1.0 puts ‘logging directly to console’

  4. event manager applet boom event syslog pattern ‘UP’

action 1.0 string ‘logging directly to console’


Answer: B


Question: 925


Which standard access control entry permits from odd-numbered hosts in the 10.0.0.0/24 subnet? A. Permit 10.0.0.0.0.0.0.1

B. Permit 10.0.0.1.0.0.0.0

C. Permit 10.0.0.1.0.0.0.254

D. Permit 10.0.0.0.255.255.255.254


Answer: C


Question: 926


What do Cisco DNA southbound APIs provide?

  1. Interface between the controller and the network devices

  2. NETCONF API interface for orchestration communication

  3. RESful API interface for orchestrator communication

  4. Interface between the controller and the consumer


Answer: A


Question: 927


Which statement about a fabric access point is true?

  1. It is in local mode an must be connected directly to the fabric border node.

  2. It is in FlexConnect mode and must be connected directly to the fabric border node.

  3. It is in local mode an must connected directly to the fabric edge switch.

  4. It is in FlexConnect mode and must be connected directly to the fabric edge switch.


Answer: C


Question: 928


Which two statements about HSRP are true? (Choose two.)

  1. Its virtual MAC is 0000.0C07.Acxx.

  2. Its multicast virtual MAC is 0000.5E00.01xx.

  3. Its default configuration allows for pre-emption.

  4. It supports tracking.

  5. It supports unique virtual MAC addresses.


Answer: AD


Question: 929


On which protocol or technology is the fabric data plane based in Cisco SD-Access fabric?

  1. LISP

  2. IS-IS

  3. Cisco TrustSec

  4. VXLAN


Answer: D Question: 930 Refer to the exhibit.


Which IP address becomes the next active next hop for 192.168.102 0/24 when 192.168.101.2 fails? A. 192.168.101.18

B. 192.168.101.6

C. 192.168.101.10

D. 192.168.101.14


Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session?

  1. HTTP Status Code 200

  2. HTTP Status Code 302

  3. HTTP Status Code 401

  4. HTTP Status Code: 504


Answer: C


Question: 932

A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?

  1. Autonomous

  2. Mobility express

  3. SD-Access wireless

  4. Local mode


Answer: B


Question: 933


IS OSPF, which LAS type is responsible for pointing to the ASBR router?

  1. type 1

  2. type 2

  3. type 3

  4. type 4


Answer: D


Question: 934

Question: 935


Which statement about VXLAN is true?

  1. VXLAN uses TCP 35 the transport protocol over the physical data cento network

  2. VXLAN extends the Layer 2 Segment ID field to 24-bits. which allows up to 4094 unique Layer 2 segments over the same network.

  3. VXLAN encapsulates a Layer 2 frame in an IP-UDP header, which allows Layer 2 adjacency across router boundaries.

  4. VXLAN uses the Spanning Tree Protocol for loop prevention.


What does this EEM applet event accomplish?


"event snmp oid 1.3.6.1.3.7.1.5.1.2.4.2.9 get-type next entry-op g entry-val 75 poll-interval 5"

  1. It issues email when the value is greater than 75% for five polling cycles.

  2. It reads an SNMP variable, and when the value exceeds 75%, it triggers an action G

  1. It presents a SNMP variable that can be interrogated.

  2. Upon the value reaching 75%, a SNMP event is generated and sent to the trap server.


Answer: B


Question: 937


Which task must be performed first to implement BFD in an IS-IS environment?

  1. Configure BFD in an interface configuration mode.

  2. Disable Cisco Express Forwarding on all interfaces running routing protocols other than IS-I

  1. Configure all IS-IS routers as Level 2 devices.

  2. Configure BFD under the IS-IS process.


Answer: D Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fs_bfd.html#wp1131797


Question: 938


Which function does a fabric edge node perform in an SD-Access deployment?

  1. Connects the SD-Access fabric to another fabric or external Layer 3 networks

  2. Connects endpoints to the fabric and forwards their traffic

  3. Provides reachability border nodes in the fabric underlay

  4. Encapsulates end-user data traffic into LIS


Answer: B Explanation:



Question: 939


Drag and Drop Question


Drag and drop the description from the left onto the correct QoS components on the right.



Answer: