1 / 8

350-401 VOL2-Question

350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) VOL2

alexablis
Download Presentation

350-401 VOL2-Question

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) VOL2 QUESTION NO: 1 Which of the following IP SLA functions do not require a responder to be configured? A.TCP Jitter B.UDP Jitter C.ICMP Jitter D.ICMP Echo Answer: D QUESTION NO: 2 A new syslog server with an IP address of 10.1.1.100 has been installed in the network. You want router R1 to send secure, encrypted messages to this server to track network events. What configuration command should you use? A.R1(config)# logging host 10.1.1.100 vrf mgmt transport tcp port 6514 B.R1(config)# logging host 10.1.1.100 vrf mgmt transport tcp port 514 C.R1(config)# logging host 10.1.1.100 vrf mgmt transport tcp port 514 D.R1(config)# logging host 10.1.1.100 vrf mgmt transport UDP port 6514 Answer: A QUESTION NO: 3 You want to create a policy that allows all TCP traffic in the port range of 20 to 110, except for telnet traffic, which should be dropped. Which of the following access control lists will accomplish this? A.deny tcp any any eq 22 permit tcp any any gt 20 lt 110 B.permit tcp any any range 22 443 deny tcp any any eq 23 C.deny tcp any any eq 23 permit tcp any any D.deny tcp any any eq 23 permit tcp any any range 20 110 Answer: D © Copyright Prep Solutions Limited, All rights reserved

  2. QUESTION NO: 4 In a Cisco SD-Access network architecture, what is the role of the Fabric Edge Node? A.It manages endpoint to device relationships B.It connects external layer 3 networks to the SDA fabric C.It connects wired endpoints to the SDA fabric D.It connects wireless endpoints to the SDA fabric Answer: C QUESTION NO: 5 Which of the following are features typically only found in a Next Generation (NextGen) firewall? (Select two) A.Network Address Translation (NAT) B.Secure remote access VPN (RA VPN) C.Deep packet inspection D.reputation based malware detection E.IPSec site-to-site VPN Answer: C, D QUESTION NO: 6 JSON web tokens (JWT) are used to secure JSON based communications. Which of the following fields make up a JWT? (Select three) A.Header B.Trailer C.Payload D.Sequence number E.Signature Answer: A, C, E QUESTION NO: 7 Ansible is being used in a network for configuration and management automation. Which of the following are true statements regarding Ansible? (Choose two) © Copyright Prep Solutions Limited, All rights reserved

  3. A.Requires an agent on the end device. B.Utilizes the concept of playbooks to execute the configuration. C.Uses a pull model, where the end devices pull configuration files from the Ansible server. D.Utilizes SSH. Answer: B, D QUESTION NO: 8 In a Cisco Software Defined Networking (SDN) architecture, what is used to describe the API communication between the SDN controller and the network elements (routers and switches) that it manages? A.Southbound API B.Northbound API C.Westbound API D.Eastbound API. Answer: A QUESTION NO: 9 In a Cisco VXLAN based network, which of the following best describes the main function of a VXLAN Tunnel Endpoint (VTEP)? A.A device that performs VXLAN encapsulation and decapsulation. B.It is a 24 bit segment ID that defines the broadcast domain. C.It is the Logical interface where the encapsulation and de-encapsulation occurs. D.It is a device that performs tunneling using GRE. Answer: A QUESTION NO: 10 Two Cisco switches are logically configured as a single switch using Cisco Stackwise technology. This will result in virtually combining which two planes? (Select two) A.Data Plane B.Control Plane C.Forwarding Plane D.Management Plane E.Bearer Plane © Copyright Prep Solutions Limited, All rights reserved

  4. Answer: B, D QUESTION NO: 11 DRAG & DROP: Please drag & drop the options provided in the left to configure NTP in client mode. Answer: QUESTION NO: 12 Please select the correct option that shows the correct combination for the Type 1 Hypervisor. A.Hardware; Hypervisor; Guest OS B.Hardware; Host OS; Hypervisor; Guest OS C.Host OS; Hypervisor; Guest OS D.Hardware; Host OS; Guest OS Answer: A © Copyright Prep Solutions Limited, All rights reserved

  5. QUESTION NO: 13 DRAG DROP the definitions on the left to their respective technological names on the right. Answer: QUESTION NO: 14 Select the prerequisites for configuring LISP from the below options. (Choose 2) A.determine the type of LISP deployment you intend to deploy B.One can directly deploy LISP without determining the type. C.LISP configuration requires the datak9 license. D.LISP configuration requires the advanced ip services license. Answer: A, C © Copyright Prep Solutions Limited, All rights reserved

  6. QUESTION NO: 15 Select the benefits of implementing Cisco DNA Center. (Choose all that apply). A.Simplified management B.Automatic VPN tunnelling C.One click Configuration D.Policy Driven Provisioning E.Ensure Network & Appliance performance Answer: A, D, E QUESTION NO: 16 A network administrator need to configure Netflow on the devices in his network. He has Source IP Address, Destination IP Address, Source Port number & Destination port number. What additional information do he need to configure Netflow. A.Layer 3 Protocol type B.Encryption type C.ToS (Type of Service) byte D.Input Logical Interface E.Hashing Algorithm F.Transform-set details Answer: A, C, D QUESTION NO: 17 A network administrator is configuring a configuration management tool for some network devices that does not support agent. Select what option will you pick from the below options to successfully configure configuration management tool for that device. A.Agent based Configuration B.Agent Less Configuration C.Proxy-agent Configuration D.None of the anove Answer: C QUESTION NO:18 DRAG DROP the definitions in the left to their respective Terminology in the right: © Copyright Prep Solutions Limited, All rights reserved

  7. Answer: QUESTION NO: 19 A network administrator has recently added a new internet line for redundancy on their ASA firewall running FTD image. He configured a new backup interface and from the interface, he is able to ping the default gateway provided to him by the ISP. The network admin is configuring SLA Monitoring and has configured following tasks: 1.IP SLA configuration as shown below: route outside 0.0.0.0 0.0.0.0 3.4.5.6 1 track 1 route backup 0.0.0.0 0.0.0.0 192.168.1.1 254 sla monitor 123 type echo protocol ipIcmpEcho 4.2.2.2 interface outside num-packets 3 frequency 10 sla monitor schedule 123 life forever start-time now track 1 rtr 123 reachability 2.NAT for the backup interface is correctly configured. 3.Static Routes are getting installed on the ASA at the time of failover © Copyright Prep Solutions Limited, All rights reserved

  8. Despite configuring these commands, the users are reporting issues with internet connectivity. What would be the next step they you will take to resolve this issue. A.Reload the device to apply changes B.Add rule on the FMC for the backup interface and deploy the policy on concerned firewall C.Permit ip any any on the firewall for unrestricted flow of traffic D.Check for issues on the core switch. QUESTION NO: 20 Select the devices from the below options that can be fart of Cisco SDWAN Solution. (Choose two) A.ISR 2900 B.ASR 1000 C.IR8300 D.FTD 1120 E.ASR 9000 Answer: B, C © Copyright Prep Solutions Limited, All rights reserved

More Related