Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

350-401 Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) Questions and Answers

Questions 4

350-401 Question 4

350-401 Question 4

Options:

Buy Now
Questions 5

350-401 Question 5

350-401 Question 5

Options:

Buy Now
Questions 6

350-401 Question 6

350-401 Question 6

Options:

Buy Now
Questions 7

350-401 Question 7

350-401 Question 7

Options:

Buy Now
Questions 8

350-401 Question 8

350-401 Question 8

Options:

Buy Now
Questions 9

350-401 Question 9

350-401 Question 9

Options:

Buy Now
Questions 10

350-401 Question 10

OR

350-401 Question 10

350-401 Question 10

Options:

Buy Now
Questions 11

350-401 Question 11

350-401 Question 11

Options:

Buy Now
Questions 12

350-401 Question 12

Options:

Buy Now
Questions 13

350-401 Question 13

350-401 Question 13

350-401 Question 13

Options:

Buy Now
Questions 14

350-401 Question 14

350-401 Question 14

350-401 Question 14

Options:

Buy Now
Questions 15

350-401 Question 15

350-401 Question 15

Options:

Buy Now
Questions 16

350-401 Question 16

350-401 Question 16

Options:

Buy Now
Questions 17

350-401 Question 17

Refer to the exibit. How should the programmer access the list of VLANs that are recevied via the API call?

Options:

A.

VlanNames(0)

B.

VlanName[Vlan1']

C.

VlanName['response']

D.

list(VlanNames)

Buy Now
Questions 18

What is a client considered when it is in web authentication state and roams between two controllers with mobility tunnels?

Options:

A.

anchor

B.

mobile

C.

foreign

D.

new

Buy Now
Questions 19

Which AP mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?

Options:

A.

SE-connect mode

B.

sensor mode

C.

client mode

D.

sniffer mode

Buy Now
Questions 20

An engineer is implementing a new SSID on a Cisco Catalyst 9800 Series WLC that must be broadcast on 6 GHz radios. Users will be required to use EAP-TLS to authenticate. Which wireless Layer 2 security method is required?

Options:

A.

WPA3 Personal

B.

WPA3 Enterprise

C.

WPA3 Enterprise

D.

WPA2 Personal

Buy Now
Questions 21

Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?

Options:

A.

Device(config)# netconf lock-time 500

B.

Device(config)# netconf max-message 1000

C.

Device(config)# no netconf ssh acl 1

D.

Device(config)# netconf max-sessions 100

Buy Now
Questions 22

Which language defines the structure or modeling of data for NETCONF and RESTCONF?

Options:

A.

YAML

B.

YANG

C.

JSON

D.

XML

Buy Now
Questions 23

Which two sources cause interference for Wi-Fi networks? (Choose two.)

Options:

A.

incandescent lights

B.

DECT 6.0 cordless phone

C.

mirrored wall

D.

fish tank

E.

900MHz baby monitor

Buy Now
Questions 24

A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?  

Options:

A.

host dependent  

B.

weighted

C.

least connection

D.

round robin

Buy Now
Questions 25

Which technology is the Cisco SD-Access control plane based on?

Options:

A.

IS-IS

B.

LISP

C.

Cisco TrustSec

D.

VXLAN

Buy Now
Questions 26

What is a benefit of Cisco TrustSec in a multilayered LAN network design?

Options:

A.

Policy can be applied on a hop-by-hop basis.

B.

There is no requirement to run IEEE 802.1X when TrustSec is enabled on a switch port

C.

Application flows between hosts on the LAN to remote destinations can be encrypted.

D.

Policy or ACLs are not required.

Buy Now
Questions 27

Drag and drop the characteristics from the left into the orchestration tools that they describe on the right.

350-401 Question 27

Options:

Buy Now
Questions 28

350-401 Question 28

Refer to the exhibit. What is achieved by this Python script?

Options:

A.

It displays the output from show lldp neighbors into a standard output.

B.

It reads the neighbor count from show lldp neighbors into a dictionary list.

C.

It displays the Layer 3 neighbors from show lldp neighbors on the terminal screen.

D.

It reads the output from show lldp neighbors into an array object.

Buy Now
Questions 29

350-401 Question 29

Refer to the exhibit A network engineer must use a Python script lo convert data received from a network device. Which type of data is printed to the console when the script runs?

Options:

A.

dictionary with a key-value pair

B.

list of lists

C.

list of strings

D.

tuple list

Buy Now
Questions 30

What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?

Options:

A.

real-time threat management to stop DDoS attacks to the core and access networks

B.

malware control

C.

real-time awareness of users, devices, and traffic on the network

D.

dynamic threat control for web traffic 

Buy Now
Questions 31

Drag and drop characteristics of PIM dense mode from the left to the right.

350-401 Question 31

Options:

Buy Now
Questions 32

Which unit of measure is used to measure wireless RF SNR?

Options:

A.

mw

B.

dbm

C.

db

D.

dBi

Buy Now
Questions 33

What are two of benefits of using VXLAN? (Choose two.)

Options:

A.

It allows for an unlimited number of segments.

B.

It has fewer devices to manage.

C.

It uses all available Layer 3 paths in the underlying network.

D.

It allows multi-tenanted segmentation.

E.

It uses a MAC in IP/TCP encapsulation technique.

Buy Now
Questions 34

What is a characteristic of VRRP?

Options:

A.

It inherently balances load amongst the available gateways.

B.

It ensures symmetric traffic flow upstream and downstream.

C.

It Is a Cisco proprietary protocol.

D.

It uses a virtual IP address and a virtual MAC address to achieve redundancy

Buy Now
Questions 35

An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?

Options:

A.

event manager applet ENABLE_OSPF_DEBUGevent syslog pattern "%OSPF-1-ADJCHG: Process 5. Nbr 1.1.1.1 on SerialO/0 from FULL to DOWN"action 1.0 cli command "debug ip ospf event"action 2.0 cli command "debug ip ospf adj"action 3.0 syslog priority informational msg "ENABLE_OSPF_DEBUG

B.

event manager applet ENABLEOSPFDEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 5, Nbr 1.1.1.1 on SerialO/0 from LOADING to FULL"action 1.0 cli command "debug ip ospf event"action 2.0 cli command "debug ip ospf adj"action 3.0 syslog priority informational msg "ENABLE JDSPF_DEBUG"

C.

event manager apple! ENABLE OSPFDEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 5. Nbr 1.1.1.1 on SerialO/0 from LOADING to FULL"action 1.0 cli command "enable"action 2.0 cli command "debug ip ospf event"action 3.0 cli command "debug ip ospf adj"action 4.0 syslog priority informational msg "ENABLE_OSPFJ} EBUG"

D.

event manager applet ENABLE_OSPF_DEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 6. Nbr 1.1.1.1 on SerialO/0 from FULL to DOWN"action 1.0 cli command "enable"action 2.0 cli command "debug ip ospf event"action 3.0 cli command "debug ip ospf adj"action 4.0 syslog priority informational msg "ENABLE_OSPF_DEBUG'*

Buy Now
Questions 36

350-401 Question 36

Refer to the exhibit. Which python code snippet prints the descriptions of disabled interface only?

350-401 Question 36

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 37

In Cisco CatalystCenter(formerly DNA Center) Inventory, the Software Version of a networkdevice displays a status of OUTDATED. What does It me?

Options:

A.

There is a later software version available on Cisco Catalyst Center (formerly DNA Center).

B.

The current software image does not match the selected Golden image for this type of network device.

C.

The current type of software image does not match the type of the network device.

D.

There is a later software version available at www.cisco.com website.

Buy Now
Questions 38

Which method ensures the confidentiality of data exchanged over a REST API?

Options:

A.

Use TLS to secure the underlying HTTP session.

B.

Use me POST method Instead or URL-encoded GET to pass parameters.

C.

Deploy digest-based authentication to protect the access to the API.

D.

Encode sensitive data using Base64 encoding.

Buy Now
Questions 39

350-401 Question 39

Refer to the exhibit. A customer asks an engineer to create a new secure WLAN to support only WPA3. Users must connect using a passphrase. Which encryption and key management configuration is required?

Options:

A.

CCMP256 encryption with CCKM key management

B.

GCMP128 encryption with OWE key management

C.

CCMP128 encryption with SAE key management

D.

GCMP256 encryption with 802.1x key management

Buy Now
Questions 40

Refer to the exhibit.

350-401 Question 40

What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

Options:

A.

A NETCONF request was made for a data model that does not exist.

B.

The device received a valid NETCONF request and serviced it without error.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

D.

The NETCONF running datastore is currently locked.

Buy Now
Questions 41

Which message type is valid for IGMPv3?

Options:

A.

leave group

B.

hello

C.

graft

D.

source-specific membership report

Buy Now
Questions 42

Which RF value represents the decline of the RF signal amplitude over a given distance"?

Options:

A.

signal-to-noise ratio

B.

received signal strength indicator

C.

free space path loss

D.

effective isotropic radiated power

Buy Now
Questions 43

A company recently decided to use RESTCONF instead of NETCONF. and many of their NETCONF scripts contain the operation (operation-create). Which RESTCONF operation must be used to replace these statements?

Options:

A.

CREATE

B.

POST

C.

GET

D.

PUT

Buy Now
Questions 44

350-401 Question 44

Refer to lhe exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF-capable CiscoIOSXE device that Is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF?

350-401 Question 44

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 45

350-401 Question 45

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

Options:

A.

A close up of a text AI-generated content may be incorrect.

B.

A close up of a logo AI-generated content may be incorrect.

C.

A close up of a text AI-generated content may be incorrect.

D.

A black text on a white background AI-generated content may be incorrect.

Buy Now
Questions 46

What is a fact about Cisco EAP-FAST?

Options:

A.

It requires a client certificate.

B.

It operates in transparent mode.

C.

It Is an IETF standard.

D.

It does not require a RADIUS server certificate.

Buy Now
Questions 47

350-401 Question 47

Refer to the exhibit. POSTMAN is showing an attempt to retrieve network device information from Cisco Catalyst Center (formerly DNA Center) API. What is the issue?

Options:

A.

The token has expired

B.

The URI string is incorrect

C.

Authentication has failed

D.

The JSON payload contains the incorrect UUID

Buy Now
Questions 48

In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)

Options:

A.

advertisement of network prefixes and their attributes

B.

configuration of control and data policies

C.

gathering of underlay infrastructure data

D.

delivery of crypto keys

E.

segmentation and differentiation of traffic

Buy Now
Questions 49

Which security feature does stateless authentication and authorization use for REST API calls?

Options:

A.

OAuth 2 tokens

B.

cookie-based session authentication

C.

API keys

D.

SSL/TLS certificate encryption

Buy Now
Questions 50

350-401 Question 50

Refer to the exhibit. A POST /discovery request spawns an asynchronous task. After querying for more information about the task, the Cisco DNA Center platform returns the REST API response. What is the status of the discovery task?

Options:

A.

restarted

B.

failed

C.

stopped

D.

successful

Buy Now
Questions 51

350-401 Question 51

Refer to the exhibit. How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?

350-401 Question 51

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 52

What is the purpose of a data modeling language?

Options:

A.

to establish a framework to process data by using an object-oriented programming approach

B.

to specify the rules for transcoding between text and binary data encodings

C.

to standardize the procedures that are executed when parsing sent and received data

D.

to describe the structure and meaning of exchanged data

Buy Now
Questions 53

What is one role of an AP join profile on a Cisco wireless network?

Options:

A.

To allocate IP addresses to APs.

B.

To provide the settings and credentials that allow APs to authenticate to the network.

C.

To allocate network resources dynamically based on demand.

D.

To manage the radio frequency settings in different areas.

Buy Now
Questions 54

350-401 Question 54

350-401 Question 54

Options:

Buy Now
Questions 55

350-401 Question 55

350-401 Question 55

Options:

Buy Now
Questions 56

350-401 Question 56

350-401 Question 56

Options:

Buy Now
Questions 57

350-401 Question 57

350-401 Question 57

Options:

Buy Now
Questions 58

350-401 Question 58

350-401 Question 58

Options:

Buy Now
Questions 59

350-401 Question 59

350-401 Question 59

Options:

Buy Now
Questions 60

350-401 Question 60

350-401 Question 60

Options:

Buy Now
Questions 61

350-401 Question 61

350-401 Question 61

Options:

Buy Now
Questions 62

350-401 Question 62

350-401 Question 62

Options:

Buy Now
Questions 63

350-401 Question 63

350-401 Question 63

Options:

Buy Now
Questions 64

Refer to the exhibit.

350-401 Question 64

Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?

350-401 Question 64

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 65

Refer to the exhibit.

350-401 Question 65

Which JSON syntax is derived from this data?

350-401 Question 65

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 66

What is used by vManage to interact with Cisco SD-WAN devices in the fabric?

Options:

A.

northbound API

B.

RESTCONF

C.

sounthbound API

D.

IPsec

Buy Now
Questions 67

An engineer must construct an access list for a Cisco Catalyst 9800 Series WLC that will redirect wireless guest users to a splash page that is hosted on a Cisco ISE server. The Cisco ISE servers are hosted at 10.9.11.141 and 10.1.11.141. Which access list meets the requirements?

Options:

A.
B.
C.
D.
Buy Now
Questions 68

Which component transports data plane traffic across a Cisco SD-WAN network?

Options:

A.

vSmart

B.

vManage

C.

cEdge

D.

vBond

Buy Now
Questions 69

Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?

Options:

A.

GLBP

B.

HSRP v2

C.

VRRP

D.

HSRP v1

Buy Now
Questions 70

A response code of 404 is received while using the REST API on Cisco UNA Center to POST to this URI.

/dna/intent/api/v1 /template-programmer/project

What does the code mean?

Options:

A.

The client made a request a resource that does not exist.

B.

The server has not implemented the functionality that is needed to fulfill the request.

C.

The request accepted for processing, but the processing was not completed.

D.

The POST/PUT request was fulfilled and a new resource was created, Information about the resource is in the response body.

Buy Now
Questions 71

Drag and drop the threat defense solutions from the left onto their descriptions on the right.

350-401 Question 71

Options:

Buy Now
Questions 72

Which mechanism is used to protect the confidentiality of sensitive information exchanged over REST APIs?

Options:

A.

TLS

B.

802.1X

C.

SSH

D.

IPsec

Buy Now
Questions 73

Drag and drop the characteristics from the left onto the orchestration tools they describe on the right.

350-401 Question 73

Options:

Buy Now
Questions 74

350-401 Question 74

Refer to the exhibit. Which result does the python code achieve?

Options:

A.

The code encrypts a base64 decrypted password.

B.

The code converts time to the "year/month/day" time format.

C.

The code converts time to the yyyymmdd representation.

D.

The code converts time to the Epoch LINUX time format.

Buy Now
Questions 75

What is a characteristic of VXLAN?

Options:

A.

It extends Layers 2 and Layer 3 overlay network over a Layer 2 underly.

B.

It has a 12-byte packet header.

C.

Its frame encapsulation is performed by MAC-in-UDP.

D.

It uses TCP for transport

Buy Now
Questions 76

Which two nodes comprise a collapsed core in a two-tier Cisco SD-Access design? (Choose two.)

Options:

A.

edge nodes

B.

distribution nodes

C.

extended nodes

D.

core nodes

E.

border nodes

Buy Now
Questions 77

Which protocol does Cisco SD-WAN uso to protect control plane communication?

Options:

A.

iPsec

B.

DTLS

C.

STUN

D.

OMP

Buy Now
Questions 78

Drag and drop the Cisco Catalyst Center (formerly DNA Center) northbound API characteristics from the left to the right. Not all options are used.

350-401 Question 78

Options:

Buy Now
Questions 79

350-401 Question 79

Refer to the exhibit. What is determined from the output?

Options:

A.

10.0.0.100 is managed by Cisco Catalyst Center (formerly DNA Center).

B.

The URL for the second query is syntactically incorrect.

C.

The authentication for the second query fails.

D.

10.0.0.200 is known to DNA Center, but its ID is an empty string.

Buy Now
Questions 80

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

•LocationA -72dBm

• Location B:-75 dBm

• Location C; -65 dBm

• Location D -80 dBm

Which two statements does the engineer use to explain these values to the customer? (Choose two.)

Options:

A.

The signal strength at location B is 10 dB better than location C.

B.

The signal strength at location C is too weak to support web surfing

C.

Location D has the strongest RF signal strength.

D.

The RF signal strength at location B is 50% weaker than location A.

E.

The RF signal strength at location C is 10 times stronger than location B

Buy Now
Questions 81

A customer has several small branches and wants to deploy a Wi-Fi solution with local management using CAPWAP. Which deployment model meets this requirement?

Options:

A.

local mode

B.

SD-Access wireless

C.

autonomous

D.

Mobility Express

Buy Now
Questions 82

Which two southbound interfaces originate from Cisco Catalyst Center (formerly DNA Center) and terminate at fabric underlay switches'? (Choose two.)

Options:

A.

ICMP Discovery

B.

UDP67 DHCP

C.

TCP 23 Telnet

D.

UDP6007 NetFlow

E.

UDP 162 SNMP

Buy Now
Questions 83

What is calculated using the numerical values of the transmitter power level, cable loss, and antenna gain?

Options:

A.

EIRP

B.

dBi

C.

RSSI

D.

SNR

Buy Now
Questions 84

350-401 Question 84

Refer to the exhibit. What is the value of the variable list after the code is run?

Options:

A.

[1, 2, 10]

B.

[1, 2, 3, 10]

C.

[1, 2, 10, 4]

D.

[1, 10, 10, 10]

Buy Now
Questions 85

350-401 Question 85

Refer to the exhibit. Which configuration causes the traffic from PC-1 to the internet to use the link between CoreSW-1 and CoreSW-2 when both switches are up?

350-401 Question 85

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 86

350-401 Question 86

350-401 Question 86

Options:

Buy Now
Questions 87

350-401 Question 87

350-401 Question 87

Options:

Buy Now
Questions 88

350-401 Question 88

350-401 Question 88

Options:

Buy Now
Exam Code: 350-401
Exam Name: Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)
Last Update: Apr 16, 2026
Questions: 393

PDF + Testing Engine

$144.99

Testing Engine

$109.99

PDF (Q&A)

$94.99