ENCOR Final Preparation Exam 350-401

Please enter your email:

Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?

 
 
 
 

Refer to the exhibit.
Which type of antenna do the radiation patterns present?

 
 
 
 

A response code of 404 is received while using the REST API on Cisco UNA Center to POST to this URI. /dna/intent/api/v1 /template-programmer/project What does the code mean?

 
 
 
 

Which reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state?

 
 
 
 

What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment?

 
 
 
 

Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors?

 
 
 
 

Refer to the exhibit.
Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning- tree port-priority 32 command on GO/1 on SW2, but the port remains blocked. Which command should be entered on the ports that are connected to Link2 to resolve the issue?

 
 
 
 

Which exhibit displays a valid JSON file?

 
 
 
 

Which standard access control entry permits from odd-numbered hosts in the 10.0.0.0/24 subnet?

 
 
 
 

 

Refer to the exhibit. Which command when applied to the Atlanta router reduces type 3 LSA flooding into the backbone area and summarizes the inter-area routes on the Dallas router?

 
 
 
 

 

A client device fails to see the enterprise SSID, but other client devices are connected to it. What is the cause of this issue?

 
 
 
 

Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session?

 
 
 
 

 

Which encryption hashing algorithm does NTP use for authentication?

 
 
 
 

A client device fails to see the enterprise SSID, but other devices are connected to it. What is the cause of this issue?

 
 
 
 

What is a benefit of data modeling languages like YANG?

 
 
 
 

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

 
 
 
 

 

Refer to the exhibit. An engineer must ensure that all traffic entering AS 200 from AS 100 chooses Link 2 as an entry point. Assume that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers. Which configuration accomplishes this task?

 
 
 
 

 

Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)?

 
 
 
 

 

Which access point mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?

 
 
 
 

 

Refer to the exhibit.
The traceroute fails from R1 to R3. What is the cause of the failure?

 
 
 
 

Refer to exhibit.
VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?

 
 
 
 

Refer to the exhibit.
An engineer reconfigures the port-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1’s log:
*Mar 1 09:47:22.245: %PM-4-ERR_DISABLE: bpduguard error detected on Gi0/0, putting Gi0/0 in err-disable state
Which command set resolves this error?

 
 
 
 

 

Refer to the exhibit. Which command must be applied to R2 for an OSPF neighborship to form?

 
 
 
 

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?

 
 
 
 

IS OSPF, which LAS type is responsible for pointing to the ASBR router?

 
 
 
 

 

Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to resolve this issue?

 
 
 
 

 

Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?

 
 
 
 

Refer to the exhibit.
SwitchC connects HR and Sales to the Core switch. However, business needs require that no traffic from the Finance VLAN traverse this switch.
Which command meets this requirement?

 
 
 
 

Refer to the exhibit.
Which IP address becomes the active next hop for 192.168.102 0/24 when 192.168.101.2 fails?

 
 
 
 

 

Which statement about an RSPAN session configuration is true?

 
 
 
 

Refer to the exhibit. A port channel is configured between SW2 and SW3. SW2 is not running a Cisco operating system. When all physical connections are mode, the port channel does not establish. Based on the configuration excerpt of SW3, what is the cause of the problem?

 
 
 
 

 

Refer to the exhibit. Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?

 
 
 
 

A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?

 
 
 
 

 

A network is being migrated from IPv4 to IPv6 using a dual-stack approach. Network management is already 100% IPv6 enabled.
In a dual-stack network with two dual-stack NetFlow collectors, how many flow exporters are needed per network device in the flexible NetFlow configuration?

 
 
 
 

What is the role of the RP in PIM sparse m Qode?

 
 
 
 

Which statement explains why Type 1 hypervisor is considered more efficient than Type 2 hypervisor?

 
 
 
 

When reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state?

 
 
 
 

Which OSPF network types are compatible and allow communication through the two peering devices?

 
 
 
 

 

A client device roams between access points located on different floors in an atrium. The access points are joined to the same controller and configured in local mode. The access points are in different AP groups and have different IP addresses, but the client VLAN in the groups is the same. Which type of roam occurs?

 
 
 
 

Which requirement for an Ansible-managed node is true?

 
 
 
 

Which method does the enable secret password option use to encrypt device passwords?

 
 
 
 

The login method is configured on the VTY lines of a router with these parameters.
1. The first method for authentication is TACACS
2. If TACACS is unavailable, login is allowed without any provided credentials
Which configuration accomplishes this task?

 
 
 
 

Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point.
Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplishes this task?

 
 
 
 

 

How does SSO work with HSRP to minimize network disruptions?

 
 
 
 

 

What mechanism does PIM use to forward multicast traffic?

 
 
 
 

 

Which statement about TLS is accurate when using RESTCONF to write configurations on network devices?

 
 
 
 

Refer to the exhibit.
An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet.

 
 

 

Which IP SLA operation requires the IP SLA responder to be configured on the remote end?

 
 
 
 

 

An engineer is concerned with the deployment of a new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?

 
 
 
 

 

Refer to the exhibit. Which command allows hosts that are connected to FastEthernet0/2 to access the Internet?

 
 
 
 

Question 1 of 50

Written by 

Leave a Reply

Your email address will not be published. Required fields are marked *