Download Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR).350-401.CertDumps.2021-07-15.102q.vcex

Vendor: Cisco
Exam Code: 350-401
Exam Name: Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)
Date: Jul 15, 2021
File Size: 7 MB
Downloads: 1

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?
  1. RPVST+
  2. RP failover
  3. BFD
  4. NSF
Correct answer: D
Question 2
What is the differences between TCAM and the MAC address table?
  1. Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM
  2. The MAC address table supports partial matches. TCAM requires an exact match
  3. The MAC address table is contained in CAM. ACL and QoS information is stored in TCAM
  4. TCAM is used to make Layer 2 forwarding decisions. CAM is used to build routing tables
Correct answer: C
Explanation:
When using Ternary Content Addressable Memory (TCAM) inside routers it’s used for faster address lookup that enables fast routing.  In switches Content Addressable Memory (CAM) is used for building and lookup of mac address table that enables L2 forwarding decisions.  Besides Longest-Prefix Matching, TCAM in today’s routers and multilayer Switch devices are used to store ACL, QoS and other things from upper-layer processing.
When using Ternary Content Addressable Memory (TCAM) inside routers it’s used for faster address lookup that enables fast routing.  
In switches Content Addressable Memory (CAM) is used for building and lookup of mac address table that enables L2 forwarding decisions.  
Besides Longest-Prefix Matching, TCAM in today’s routers and multilayer Switch devices are used to store ACL, QoS and other things from upper-layer processing.
Question 3
Which two southbound interfaces originate from Cisco DNA Center and terminate at fabric underlay switches? (Choose two)
  1. UDP 67: DHCP
  2. ICMP: Discovery
  3. TCP 23: Telnet
  4. UDP 162: SNMP
  5. UDP 6007: NetFlow
Correct answer: BC
Explanation:
According to this Cisco link (Table 5), the following ports are from Cisco DNA Center to fabric underlay switches: TCP 22: From Cisco DNA Center to fabric switches’ loopbacks for SSH TCP 23: From Cisco DNA Center to fabric switches’ loopbacks for TELNET UDP 161: From Cisco DNA Center to fabric switches’ loopbacks for SNMP device discovery ICMP: From Cisco DNA Center to fabric switches’ loopbacks for SNMP device discovery TCP 443: From Cisco DNA Center to fabric switches for software upgrades (also to the internet if there is no proxy)  UDP 6007: From Cisco DNA Center to switches and routers for NetFlow UDP 123: From Cisco DNA Center to fabric switches for the initial period during LAN automation So in fact there are three correct answers for this question, including TCP 23, ICMP and UDP 6007 but  there are two best answers TCP 23 and ICMP (which match “fabric switches” in the question).
According to this Cisco link (Table 5), the following ports are from Cisco DNA Center to fabric underlay switches: 
  • TCP 22: From Cisco DNA Center to fabric switches’ loopbacks for SSH 
  • TCP 23: From Cisco DNA Center to fabric switches’ loopbacks for TELNET 
  • UDP 161: From Cisco DNA Center to fabric switches’ loopbacks for SNMP device discovery 
  • ICMP: From Cisco DNA Center to fabric switches’ loopbacks for SNMP device discovery 
  • TCP 443: From Cisco DNA Center to fabric switches for software upgrades (also to the internet if there is no proxy)  
  • UDP 6007: From Cisco DNA Center to switches and routers for NetFlow 
  • UDP 123: From Cisco DNA Center to fabric switches for the initial period during LAN automation 
So in fact there are three correct answers for this question, including TCP 23, ICMP and UDP 6007 but  there are two best answers TCP 23 and ICMP 
(which match “fabric switches” in the question).
Question 4
What is the function of a control-plane node in a Cisco SD-Access solution?
  1. to connect APs and wireless endpoints to the SD-Access fabric
  2. to connect external Layer 3 networks to the SD Access fabric
  3. to implement policies and communicate with networks outside the fabric
  4. to run a mapping system that manages endpoint to network device relationships
Correct answer: D
Explanation:
Control-Plane Nodes – Map System that manages Endpoint to Device relationships  Fabric Border Nodes – A Fabric device (e.g. Core) that connects External L3 network(s) to the SDA Fabric  Fabric Edge Nodes – A Fabric device (e.g. Access or Distribution) that connects Wired Endpoints to the SDA Fabric  Fabric Wireless Controller – A Fabric device (WLC) that connects APs and Wireless Endpoints to the SDA Fabric  Reference: https://www.cisco.com/c/dam/m/hr_hr/training-events/2019/cisco-connect/pdf/VH-Cisco-SD-Access-Connecting.pdf
Control-Plane Nodes – Map System that manages Endpoint to Device relationships  
Fabric Border Nodes – A Fabric device (e.g. Core) that connects External L3 network(s) to the SDA Fabric  
Fabric Edge Nodes – A Fabric device (e.g. Access or Distribution) that connects Wired Endpoints to the SDA Fabric  
Fabric Wireless Controller – A Fabric device (WLC) that connects APs and Wireless Endpoints to the SDA Fabric  
Reference: https://www.cisco.com/c/dam/m/hr_hr/training-events/2019/cisco-connect/pdf/VH-Cisco-SD-Access-Connecting.pdf
Question 5
Refer to the exhibit. What is the result when a switch that is running PVST+ is added to this network?  
   
  1. Spanning tree is disabled automatically on the network
  2. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+
  3. Both switches operate in the PVST+ mode
  4. Both switches operate in the Rapid PVST+ mode
Correct answer: B
Explanation:
From the output we see DSW2 is running in RSTP mode (in fact Rapid PVST+ mode as Cisco does not support RSTP alone). When a new switch running PVST+ mode is added to the topology, they keep running the old STP instances as RSTP (in fact Rapid PVST+) is compatible with PVST+.
From the output we see DSW2 is running in RSTP mode (in fact Rapid PVST+ mode as Cisco does not support RSTP alone). 
When a new switch running PVST+ mode is added to the topology, they keep running the old STP instances as RSTP (in fact Rapid PVST+) is compatible with PVST+.
Question 6
What is a characteristic of a next-generation firewall?
  1. required in each layer of the network
  2. filters traffic using Layer 3 and Layer 4 information only
  3. only required at the network perimeter
  4. provides intrusion prevention
Correct answer: D
Explanation:
A next generation firewall adds additional features such as application control, integrated intrusion prevention (IPS) and often more advanced threat prevention capabilities like sandboxing.
A next generation firewall adds additional features such as application control, integrated intrusion prevention (IPS) and often more advanced threat prevention capabilities like sandboxing.
Question 7
Which measure is used by an NTP server to indicate its closeness to the authoritative time source?
  1. stratum
  2. hop count
  3. time zone
  4. latency
Correct answer: A
Explanation:
The stratum levels define the distance from the reference clock. A reference clock is a stratum 0 device that is assumed to be accurate and has little or no delay associated with it. Stratum 0 servers cannot be used on the network but they are directly connected to computers which then operate as stratum-1 servers. A stratum 1 time server acts as a primary network time standard.        A stratum 2 server is connected to the stratum 1 server; then a stratum 3 server is connected to the stratum 2 server and so on. A stratum 2 server gets its time via NTP packet requests from a stratum 1 server. A stratum 3 server gets its time via NTP packet requests from a stratum-2 server…
The stratum levels define the distance from the reference clock. 
A reference clock is a stratum 0 device that is assumed to be accurate and has little or no delay associated with it. 
Stratum 0 servers cannot be used on the network but they are directly connected to computers which then operate as stratum-1 servers. 
A stratum 1 time server acts as a primary network time standard.  
   
  
A stratum 2 server is connected to the stratum 1 server; then a stratum 3 server is connected to the stratum 2 server and so on. 
A stratum 2 server gets its time via NTP packet requests from a stratum 1 server. 
A stratum 3 server gets its time via NTP packet requests from a stratum-2 server…
Question 8
Which two resu lts occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two)
  1. All devices reload after detecting loss of connection to Cisco DNA Center
  2. Already connected users are unaffected, but new users cannot connect
  3. Users lose connectivity
  4. Cisco DNA Center is unable to collect monitoring data in Assurance
  5. User connectivity is unaffected
Correct answer: DE
Explanation:
If you have Cisco SD-Access implemented and DNA Center becomes unreachable then the wired and wireless network will continue to forward packets as usual. There will be no impact to network performance or behavior. Yes you will be able to SSH / telnet / console into switches and wireless network infrastructure as usual. For the period DNA Center is unreachable, Assurance data will be lost,and you will not be able to make configuration changes to the Cisco SD-Access network.
If you have Cisco SD-Access implemented and DNA Center becomes unreachable then the wired and wireless network will continue to forward packets as usual. 
There will be no impact to network performance or behavior. Yes you will be able to SSH / telnet / console into switches and wireless network infrastructure as usual. 
For the period DNA Center is unreachable, Assurance data will be lost,and you will not be able to make configuration changes to the Cisco SD-Access network.
Question 9
Which two components are supported by LISP? (Choose two)
  1. proxy ETR
  2. HMAC algorithm
  3. route reflector
  4. egress tunnel router
  5. spoke
Correct answer: AD
Explanation:
An Egress Tunnel Router (ETR) connects a site to the LISP-capable part of a core network (such as the Internet), publishes EID-to-RLOC mappings for the site, responds to Map-Request messages, and decapsulates and delivers LISP-encapsulated user data to end systems at the site.  A LISP proxy ETR (PETR) implements ETR functions on behalf of non-LISP sites. A PETR is typically used when a LISP site needs to send traffic to non-LISP sites but the LISP site is connected through a service provider that does not accept nonroutable EIDs as packet sources. PETRs act just like ETRs but for EIDs that send traffic to destinations at non-LISP sites.
An Egress Tunnel Router (ETR) connects a site to the LISP-capable part of a core network (such as the Internet), publishes EID-to-RLOC mappings for the site, responds to Map-Request messages, and decapsulates and delivers LISP-encapsulated user data to end systems at the site.  
A LISP proxy ETR (PETR) implements ETR functions on behalf of non-LISP sites. A PETR is typically used when a LISP site needs to send traffic to non-LISP sites but the LISP site is connected through a service provider that does not accept nonroutable EIDs as packet sources. PETRs act just like ETRs but for EIDs that send traffic to destinations at non-LISP sites.
Question 10
Drag and drop the virtual component from the left onto their descriptions on the right.  
 
Correct answer: To work with this question, an Exam Simulator is required.
Explanation:
The VMX file simply holds the virtual machine configuration.  VMDK (short for Virtual Machine Disk) is a file format that describes containers for virtual hard disk drives to be used in virtual machines like VMware Workstation or VirtualBox.  An OVA file is an Open Virtualization Appliance that contains a compressed, “installable” version of a virtual machine. When you open an OVA file it extracts the VM and imports it into whatever virtualization software you have installed on your computer.
The VMX file simply holds the virtual machine configuration.  
VMDK (short for Virtual Machine Disk) is a file format that describes containers for virtual hard disk drives to be used in virtual machines like VMware Workstation or VirtualBox.  
An OVA file is an Open Virtualization Appliance that contains a compressed, “installable” version of a virtual machine. 
When you open an OVA file it extracts the VM and imports it into whatever virtualization software you have installed on your computer.
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!