Exam Logo

Cisco (350-401-ENCOR) Exam Questions And Answers page 20


Refer to the exhibit. Which type of antenna is shown on the radiation patterns?
Infrastructure Network Assurance
An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?
Network Assurance Security
While configuring an IOS router for HSRP with a virtual IP of 10.1.1.1, an engineer sees this log message.

Jan 1 12:12:12.111 : %HSRP-4-DIFFVIP1: GigabitEthernet0/0 Grp 1 active routers virtual IP address 10.1.1.1 is different to the locally configured address 10.1.1.25

Which configuration change must the engineer make?
Virtualization Infrastructure
Refer to the exhibit.


Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?
Virtualization Security
A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Clients connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however, clients cannot roam between the 5520 and 9800 controllers without dropping their connection. Which feature must be configured to remedy the issue?
Virtualization Security

Refer to the exhibit. What are two effects of this configuration? (Choose two.)
Virtualization Infrastructure
Which First Hop Redundancy Protocol should be used to meet a design requirement for more efficient default gateway bandwidth usage across multiple devices?
Infrastructure Network Assurance
Refer to the exhibit.


Router1 is currently operating as the HSRP primary with a priority of 110. Router1 fails and Router2 takes over the forwarding role. Which command on Router1 causes it to take over the forwarding role when it returns to service?
Virtualization Security
Which configuration restricts the amount of SSH traffic that a router accepts to 100 kbps?
Virtualization Security
Which function does a fabric wireless LAN controller perform in a Cisco SD-Access deployment?
Infrastructure Network Assurance