Cisco (350-401-ENCOR) Exam Questions And Answers page 12
Drag and drop the virtual components from the left onto their descriptions on the right.
Virtualization
Infrastructure
A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two.)
802.1X
OPEN
WEP
WPA (AES)
Infrastructure
Security
How does EIGRP differ from OSPF?
EIGRP is more prone to routing loops than OSPF.
EIGRP uses more CPU and memory than OSPF.
EIGRP has a full map of the topology, and OSPF only knows directly connected neighbors.
EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost.
Network Assurance
Security
Drag and drop the REST API authentication methods from the left onto their descriptions on the right.
Virtualization
Security
Which NGFW mode blocks flows crossing the firewall?
tap
inline
passive
inline tap
Network Assurance
Security
What is the role of a fusion router in SD-Access?
Single Choice
What is the role of a fusion router in an SD-Access solution?
acts as a DNS server
provides additional forwarding capacity to the fabric
performs route leaking between user-defined virtual networks and shared services
provides connectivity to external networks
Infrastructure
Network Assurance
What facts does the device output confirm?
Multiple Choice
Refer to the exhibit. Which two facts does the device output confirm? (Choose two.)
The device s HSRP group uses the virtual IP address 10.0.3.242.
The device is configured with the default HSRP priority.
The device sends unicast messages to its peers.
The standby device is configured with the default HSRP priority.
The device is using the default HSRP hello timer.
Infrastructure
Network Assurance
Refer to the exhibit. Which JSON syntax is derived from this data?
{[{ First Name : Johnny , Last Name : Table , Hobbies : [ Running , Video games ]}, { First Name : Billy , Last Name : Smith , Hobbies : [ Napping , Reading ]}]}
{ Person : [{ First Name : Johnny , Last Name : Table , Hobbies : Running , Video games }, { First Name : Billy , Last Name : Smith , Hobbies : Napping , Reading }]}
{[{ First Name : Johnny , Last Name : Table , Hobbies : Running , Hobbies : Video games }, { First Name : Billy , Last Name : Smith , Hobbies : Napping , Reading }]}
{ Person : [{ First Name : Johnny , Last Name : Table , Hobbies : [ Running , Video games ]}, { First Name : Billy , Last Name : Smith , Hobbies : [ Napping , Reading ]}]}
Architecture
Security
Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point.
Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplishes this task?
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point.
Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplishes this task?
R4(config-router)bgp default local-preference 200
R3(config-router)bgp default local-preference 200
R4(config-router)neighbor 10.2.2.2 weight 200
R3(config-router)neighbor 10.1.1.1 weight 200
Virtualization
Network Assurance
Which hypervisor is classified as a Type 1?
Single Choice
Which entity is a Type 1 hypervisor?
Oracle VM VirtualBox
Citrix XenServer
VMware server
Microsoft Virtual PC
Virtualization
Comments