Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 350-401 - Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)

Page: 2 / 6
Total 393 questions

Which DNS record type is needed to allow a Cisco AP to discover a WLC when using IPv4?

A.

CNAME record

B.

A record

C.

NS record

D.

SOA record

When deploying Cisco SD-Access Fabric APs, where does the data plane VXLAN tunnel terminate?

A.

on the first-hop fabric edge switch

B.

on the WLC node

C.

on the fabric border node switch

D.

directly on the fabric APs

Which three methods does Cisco Catalyst Center (formerly DNA Center) use to discover devices? (Choose three.)

A.

SNMP

B.

a specified range of IP addresses

C.

NETCONF

D.

LLDP

E.

ping

F.

CDP

Which features does Cisco EDR use to provide threat detection and response protection?

A.

containment, threat intelligence, and machine learning

B.

firewalling and intrusion prevention

C.

container-based agents

D.

cloud analysts and endpoint firewall controls

Drag and drop the command snippets from the right onto the blanks in the configuration to create an EEM applet that will enable interface Loopback0 and log a message when the logging message -Interface Loopback0. changed state to administratively down" is received. Not all commands are used.

Which new security enhancement is introduced by deploying a next-generation firewall at the data center in addition to the Internet edge?

A.

virtual private network for remote access

B.

DDoS protection

C.

firewall protection of the east-west traffic at the data center

D.

firewall protection of the south-north traffic at the data center

In a fabric-enabled wireless network, which device is responsible for maintaining the endpoint ID database?

A.

fabric border node

B.

fabric edge node

C.

fabric wireless controller

D.

control plane node

Refer to the exhibit. What is achieved by this Python script?

A.

It displays the output from show lldp neighbors into a standard output.

B.

It reads the neighbor count from show lldp neighbors into a dictionary list.

C.

It displays the Layer 3 neighbors from show lldp neighbors on the terminal screen.

D.

It reads the output from show lldp neighbors into an array object.

Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.

Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?

A.

ETR

B.

MS

C.

ITR

D.

MR