Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 350-401 - Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)

Page: 4 / 9
Total 378 questions

What is a characteristic of MACsec?

A.

8021AE provides encryption and authentication services

B.

8021AE is butt between the host and switch using the MKA protocol which negotiates encryption keys based on the master session key from a successful 802IX session

C.

802.1AE is built between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)

D.

8021AE is negotiated using Cisco AnyConnect NAM and the SAP protocol

What is a client who is using 802.1x for authentication referred to as?

A.

authenticator

B.

policy enforcement point

C.

NAC device

D.

supplicant

What is the intent API in Cisco Catalyst Center (formerly DNA Center)?

A.

northbound consumer-facing RESTful API, which enables network discovery and configuration management

B.

southbound consumer-facing RESTful API. which enables network discovery and configuration management

C.

interface between the controller and the network devices, which enables network discovery and configuration management

D.

westbound interface, which allows the exchange of data such as ITSM. IPAM, and reporting information

Refer to lhe exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF-capable CiscoIOSXE device that Is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which authorization framework gives third-party applications limited access to HTTP services?

A.

IPsec

B.

GRE

C.

Basic Auth

D.

OAuth 2.0

Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

A.

A close up of a text AI-generated content may be incorrect.

B.

A close up of a logo AI-generated content may be incorrect.

C.

A close up of a text AI-generated content may be incorrect.

D.

A black text on a white background AI-generated content may be incorrect.

Exhibit.

Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?

A.

line vty 0 15

absolute-timeout 600

B.

line vty 0 15

exec-timeout

C.

line vty 01 5

exec-timeout 10 0

D.

line vty 0 4

exec-timeout 600

Which three methods does Cisco Catalyst Center (formerly DNA Center) use to discover devices? (Choose three.)

A.

SNMP

B.

a specified range of IP addresses

C.

NETCONF

D.

LLDP

E.

ping

F.

CDP

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

A.

RSSI

B.

SNR

C.

Noise

D.

CCI