Cisco 350-401 Practice Exams
Last updated on Apr 14,2025- Exam Code: 350-401
- Exam Name: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
- Certification Provider: Cisco
- Latest update: Apr 14,2025
Refer to the Exhibit.
What does the cisco DNA REST response indicate?
- A . Cisco DNA Center has the Incorrect credentials for cat3850-1
- B . Cisco DNA Center is unable to communicate with cat9000-1
- C . Cisco DNA Center has the incorrect credentials for cat9000-1
- D . Cisco DNA Center has the Incorrect credentials for RouterASR-1
A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP.
Which deployment model meets this requirement?
- A . Autonomous
- B . Mobility Express
- C . SD-Access wireless
- D . Local mode
What are two benefits of YANG? (Choose two.)
- A . It enforces the use of a specific encoding format for NETCONF.
- B . It collects statistical constraint analysis information.
- C . It enables multiple leaf statements to exist within a leaf list.
- D . It enforces configuration semantics.
- E . It enforces configuration constraints.
At which Layer does Cisco DNA Center support REST controls?
- A . EEM applets or scripts
- B . Session layer
- C . YMAL output from responses to API calls
- D . Northbound APIs
Refer to the exhibit.
What is the Json syntax that is formed from the data?
- A . {Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]}
- B . {"Name": "Bob Johnson", "Age": 75, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}
- C . {"˜Name’: "˜Bob Johnson’, "˜Age’: 75, "˜Alive’: True, "˜Favorite Foods’: "˜Cereal’, "˜Mustard’, "˜Onions’}
- D . {"Name": "Bob Johnson", "Age": Seventyfive, "Alive": true, "Favorite Foods": ["Cereal", "Mustard",
"Onions"]}
Refer to the Exhibit.
An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2.
Based on the output, which action resolves this issue?
- A . Configure less member ports on Switch2.
- B . Configure the same port channel interface number on both switches
- C . Configure the same EtherChannel protocol on both switches
- D . Configure more member ports on Switch1.
Refer to the exhibit.
What are two effects of this configuration? (Choose two.)
- A . R1 becomes the active router.
- B . R1 becomes the standby router.
- C . If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online.
- D . If R1 goes down. R2 becomes active and remains the active device when R1 comes back online.
- E . If R1 goes down, R2 becomes active but reverts to standby when R1 comes back online.
Refer to the exhibit.
Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?
- A . ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 global
ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 global
ip route 192.168.1.0 255.255.255.0 Vlan10
ip route 172.16.1.0 255.255.255.0 Vlan20 - B . ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 Customer2
ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 Customer1 - C . ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 Customer1
ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 Customer2 - D . ip route vrf Customer1 172.16.1.1 255.255.255.255 172.16.1.1 global
ip route vrf Customer2 192.168.1.200 255.255.255.0 192.168.1.1 global
ip route 192.168.1.0 255.255.255.0 Vlan10
ip route 172.16.1.0 255.255.255.0 Vlan20
Refer to the exhibit.
An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet.
Which explanation of this behavior is true?
- A . Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.
- B . Only standard access control lists can block traffic from a source IP address.
- C . After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.
- D . The access control list must contain an explicit deny to block traffic from the router.
What is a characteristic of a virtual machine?
- A . It must be aware of other virtual machines, in order to allocate physical resources for them
- B . It is deployable without a hypervisor to host it
- C . It must run the same operating system as its host
- D . It relies on hypervisors to allocate computing resources for it