Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 350-401 - Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)

Page: 1 / 8
Total 361 questions

Which technique is used to protect end user devices and data from unknown file behavior?

A.

crypto file ransomware protection using a file hash calculation

B.

file retrospection using continuous scan and analyses

C.

phishing file quarantine using an internal environment to store attached files

D.

file sandboxing using a protected environment to analyze and simulate the behavior of unknown files

Which two pieces of information are necessary to compute SNR? (Choose two.)

A.

EIRP

B.

noise floor

C.

antenna gain

D.

RSSI

E.

transmit power

Refer to the exhibit. How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?

A.

event manager applet ondemand

event register

action 1.0 syslog priority critical msg 'This is a message from ondemand'

B.

event manager applet ondemand

event manual

action 1.0 syslog priority critical msg 'This is a message from ondemand'

C.

event manager applet ondemand

event none

action 1.0 syslog priority critical msg 'This is a message from ondemand'

D.

event manager applet ondemand

action 1.0 syslog priority critical msg 'This is a message from ondemand'

Drag and drop the configuration management tools from the left onto the configuration styles they use on the right

What is a characteristics of a type 1 hypervisor?

A.

It runs on top of the host operating system.

B.

It is preferred for supporting nonproduction workloads.

C.

It has greater latency than a Type 2 hypervisor.

D.

It runs on top of bare metal servers.

What are two benefits of using Cisco TrustSec? (Choose two.)

A.

unknown file analysis using sandboxing

B.

advanced endpoint protection against malware

C.

end-to-end traffic encryption

D.

simplified management of network access

E.

consistent network segmentation

What is a characteristic of an AP that operates in FlexConnect mode?

A.

Configuration is done directly on the AP rather than on a controller.

B.

Dot1x authentication is not supported for AP clients in this mode.

C.

Client authentication is always performed on the A P.

D.

FlexConnect groups are required to support 802.11 r fast roaming.

What is a characteristic of omnidirectional antennas?

A.

It includes dish antennas.

B.

It has high gain.

C.

It provides the most focused and narrow beamwidth.

D.

It includes dipole antennas.

With IGMPv2, which multicast group address does the IGMP querier use to send query messages to all hosts on the LAN?

A.

239.0.0.2

B.

224.0.0.1

C.

239.0.0.1

D.

224.0.0.2