Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 350-401 - Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)

Page: 3 / 8
Total 361 questions

An engineer is reviewing a PCAP file that contains a packet capture of a four-way handshake exchange between a dient and AP using WPA2 Enterprise Which EAPOL message validates and confirms that the client device has successfully Installed the GTK?

A.

M4-Message

B.

M3-Message

C.

M2-Message

D.

M1-Message

What is a characteristic of MACsec?

A.

8021AE provides encryption and authentication services

B.

8021AE is butt between the host and switch using the MKA protocol which negotiates encryption keys based on the master session key from a successful 802IX session

C.

802.1AE is built between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)

D.

8021AE is negotiated using Cisco AnyConnect NAM and the SAP protocol

Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?

A.

ingress tunnel router

B.

map resolver

C.

egress tunnel router

D.

map server

Refer to the exhibit. Which HTTP request produced the REST API response that was returned by the Cisco Catalyst Center (formerly DNA Center) platform?

A.

POST /auth/token

B.

GET /network-device

C.

GET /template-programmer/template/version/42a3df73-3ef4-49e2-b4f0-6927bbd4bf52

D.

POST /discovery

What is contained in the VXLAN header?

A.

original Layer 2 VLAN ID

B.

Endpoint ID

C.

VXLAN network identifier

D.

source and destination RLOC ID

Assuming the WLC's interfaces are not in the same subnet as the RADIUS server, which interface would the WLC use as the source for all RADIUS-related traffic?

A.

the interface specified on the WLAN configuration

B.

any interface configured on the WLC

C.

the controller management interface

D.

the controller virtual interface

What is one main REST security design principle?

A.

separation of privilege

B.

password hashing

C.

confidential algorithms

D.

OAuth

What is a TLOC in a Cisco Catalyst SD-WAN deployment?

A.

component set by the administrator to differentiate similar nodes that offer a common service

B.

value that identifies a specific tunnel within the Cisco Catalyst SD-WAN overlay

C.

identifier that represents a specific service offered by nodes within the Cisco Catalyst SD-WAN overlay

D.

attribute that acts as a next hop for network prefixes

Why would an architect use an OSPF virtual link?

A.

to allow a stub area to transit another stub area

B.

to merge two existing Area 0s through a nonbackbone

C.

to connect two networks that have overlapping private IP address space

D.

to connect a nonbackbone area to Area 0 through another nonbackbone area

What is the recommended minimum SNR for data applications on wireless networks?

A.

15

B.

20

C.

25

D.

10