Cisco 350-401 Practice Exams
Last updated on Apr 05,2025- Exam Code: 350-401
- Exam Name: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
- Certification Provider: Cisco
- Latest update: Apr 05,2025
Which configuration restricts the amount of SSH that a router accepts 100 kbps?
- A . Option A
- B . Option B
- C . Option C
- D . Option D
Which two operations are valid for RESTCONF? (Choose two.)
- A . HEAD
- B . REMOVE
- C . PULL
- D . PATCH
- E . ADD
- F . PUSH
Refer to the Exhibit.
A network engineer configures a new GRE tunnel and enters the show run command.
What does the output verify?
- A . The tunnel will be established and work as expected
- B . The tunnel destination will be known via the tunnel interface
- C . The tunnel keepalive is configured incorrectly because they must match on both sites
- D . The default MTU of the tunnel interface is 1500 byte.
Which characteristic distinguishes Ansible from Chef?
- A . Ansible lacs redundancy support for the master server. Chef runs two masters in an active/active mode.
- B . Ansible uses Ruby to manage configurations. Chef uses YAML to manage configurations.
- C . Ansible pushes the configuration to the client. Chef client pulls the configuration from the server.
- D . The Ansible server can run on Linux, Unix or Windows. The Chef server must run on Linux or Unix.
Refer to the exhibit.
An engineer configures monitoring on SW1 and enters the show command to verify operation.
What does the output confirm?
- A . SPAN session 1 monitors activity on VLAN 50 of a remote switch
- B . SPAN session 2 only monitors egress traffic exiting port FastEthernet 0/14.
- C . SPAN session 2 monitors all traffic entering and exiting port FastEthernet 0/15.
- D . RSPAN session 1 is incompletely configured for monitoring
What is the data policy in a Cisco SD-WAN deployment?
- A . list of ordered statements that define node configurations and authentication used within the SD-WAN overlay
- B . Set of statements that defines how data is forwarded based on IP packet information and specific VPNs
- C . detailed database mapping several kinds of addresses with their corresponding location
- D . group of services tested to guarantee devices and links liveliness within the SD-WAN overlay
Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?
- A . All devices integrating with ISE
- B . selected individual devices
- C . all devices in selected sites
- D . all wired devices
Which method creates an EEM applet policy that is registered with EEM and runs on demand or
manually?
- A . event manager applet ondemand
event register
action 1.0 syslog priority critical msg ‘This is a message from ondemand’ - B . event manager applet ondemand
event manual
action 1.0 syslog priority critical msg ‘This is a message from ondemand’ - C . event manager applet ondemand
event none
action 1.0 syslog priority critical msg ‘This is a message from ondemand’ - D . event manager applet ondemand
action 1.0 syslog priority critical msg ‘This is a message from ondemand’
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?
- A . Layer 3
- B . inter-xTR
- C . auto anchor
- D . fast roam
Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)
- A . port flapping
- B . excess jitter
- C . misrouted network packets
- D . duplicate IP addresses
- E . bandwidth-related packet loss