Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 350-401 - Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)

Page: 3 / 9
Total 378 questions

What are two benefits of using Cisco TrustSec? (Choose two.)

A.

unknown file analysis using sandboxing

B.

advanced endpoint protection against malware

C.

end-to-end traffic encryption

D.

simplified management of network access

E.

consistent network segmentation

A company recently decided to use RESTCONF instead of NETCONF. and many of their NETCONF scripts contain the operation (operation-create). Which RESTCONF operation must be used to replace these statements?

A.

CREATE

B.

POST

C.

GET

D.

PUT

Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which features does Cisco EDR use to provide threat detection and response protection?

A.

containment, threat intelligence, and machine learning

B.

firewalling and intrusion prevention

C.

container-based agents

D.

cloud analysts and endpoint firewall controls

Drag and drop the snippets onto the blanks within the code to construct a script that blocks a MAC address.

Which data format can be used for an API request?

A.

HTML

B.

PERL

C.

JSON

D.

Python

Which tool functions in a push model, supports languages like Python or Ruby, and does not require an agent to be installed per host?

A.

Puppet

B.

Ansible

C.

Saltstack

D.

Chef

Which AP mode allows an engineer to scan configured channels for rogue access points?

A.

sniffer

B.

monitor

C.

bridge

D.

local

Which framework is used for third-party authorization?

A.

API keys

B.

custom tokens

C.

OAuth

D.

SOAP

What is the purpose of a data modeling language?

A.

to establish a framework to process data by using an object-oriented programming approach

B.

to specify the rules for transcoding between text and binary data encodings

C.

to standardize the procedures that are executed when parsing sent and received data

D.

to describe the structure and meaning of exchanged data