Download Cisco.350-401.PassLeader.2021-04-22.353q.vcex

Download Exam

File Info

Exam Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)
Number 350-401
File Name Cisco.350-401.PassLeader.2021-04-22.353q.vcex
Size 18 MB
Posted Apr 22, 2021
Download Cisco.350-401.PassLeader.2021-04-22.353q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What is a benefit of data modeling languages like YANG?


  1. They enable programmers to change or write their own application within the device operating system.
  2. They create more secure and efficient SNMP OIDs.
  3. They make the CLI simpler and more efficient.
  4. They provide a standardized data structure, which results in configuration scalability and consistency.
Correct answer: D
Explanation:
Yet Another Next Generation (YANG) is a language which is only used to describe data models (structure). It is not XML or JSON.
Yet Another Next Generation (YANG) is a language which is only used to describe data models (structure). It is not XML or JSON.



Question 2

A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP.   
Which deployment model meets this requirement?


  1. Autonomous
  2. Mobility express
  3. SD-Access wireless
  4. Local mode
Correct answer: B
Explanation:
Mobility Express is the ability to use an access point (AP) as a controller instead of a real WLAN controller. But this solution is only suitable for small to midsize, or multi-site branch locations where you might not want to invest in a dedicated WLC. A Mobility Express WLC can support up to 100 APs. Mobility Express WLC also uses CAPWAP to communicate to other APs.  Note: Local mode is the most common mode that an AP operates in. This is also the default mode. In local mode, the LAP maintains a CAPWAP (or LWAPP) tunnel to its associated controller.
Mobility Express is the ability to use an access point (AP) as a controller instead of a real WLAN controller. But this solution is only suitable for small to midsize, or multi-site branch locations where you might not want to invest in a dedicated WLC. A Mobility Express WLC can support up to 100 APs. Mobility Express WLC also uses CAPWAP to communicate to other APs.  
Note: Local mode is the most common mode that an AP operates in. This is also the default mode. In local mode, the LAP maintains a CAPWAP (or LWAPP) tunnel to its associated controller.



Question 3

Which statement about agent-based versus agentless configuration management tools is true?


  1. Agentless tools require no messaging systems between master and slaves.
  2. Agentless tools use proxy nodes to interface with slave nodes.
  3. Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes.
  4. Agent-based tools do not require installation of additional software packages on the slave nodes.
Correct answer: C
Explanation:
Agentless tool means that no software or agent needs to be installed on the client machines that are to be managed. Ansible is such an agentless tool. In contrast to agentless tool, agent-based tool requires software or agent to be installed on the client. Therefore the master and slave nodes can communicate directly without the need of high-level language interpreter.  
Agentless tool means that no software or agent needs to be installed on the client machines that are to be managed. Ansible is such an agentless tool. In contrast to agentless tool, agent-based tool requires software or agent to be installed on the client. Therefore the master and slave nodes can communicate directly without the need of high-level language interpreter.  



Question 4

On which protocol or technology is the fabric data plane based in Cisco SD-Access fabric?


  1. LISP
  2. IS-IS
  3. Cisco TrustSec
  4. VXLAN
Correct answer: D
Explanation:
The tunneling technology used for the fabric data plane is based on Virtual Extensible LAN (VXLAN). VXLAN encapsulation is UDP based, meaning that it can be forwarded by any IP-based network (legacy or third party) and creates the overlay network for the SD-Access fabric.  Although LISP is the control plane for the SD-Access fabric, it does not use LISP data encapsulation for the data plane; instead, it uses VXLAN encapsulation because it is capable of encapsulating the original Ethernet header to perform MAC-in-IP encapsulation, while LISP does not. Using VXLAN allows the SD-Access fabric to support Layer 2 and Layer 3 virtual topologies (overlays) and the ability to operate over any IP-based network with built-in network segmentation (VRF instance/VN) and built-in group-based policy.
The tunneling technology used for the fabric data plane is based on Virtual Extensible LAN (VXLAN). VXLAN encapsulation is UDP based, meaning that it can be forwarded by any IP-based network (legacy or third party) and creates the overlay network for the SD-Access fabric.  
Although LISP is the control plane for the SD-Access fabric, it does not use LISP data encapsulation for the data plane; instead, it uses VXLAN encapsulation because it is capable of encapsulating the original Ethernet header to perform MAC-in-IP encapsulation, while LISP does not. Using VXLAN allows the SD-Access fabric to support Layer 2 and Layer 3 virtual topologies (overlays) and the ability to operate over any IP-based network with built-in network segmentation (VRF instance/VN) and built-in group-based policy.



Question 5

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?


  1. logging host 10.2.3.4 vrf mgmt transport tcp port 6514
  2. logging host 10.2.3.4 vrf mgmt transport udp port 6514
  3. logging host 10.2.3.4 vrf mgmt transport tcp port 514
  4. logging host 10.2.3.4 vrf mgmt transport udp port 514
Correct answer: A
Explanation:
The TCP port 6514 has been allocated as the default port for syslog over Transport Layer Security (TLS).  Reference: https://tools.ietf.org/html/rfc5425
The TCP port 6514 has been allocated as the default port for syslog over Transport Layer Security (TLS).  
Reference: https://tools.ietf.org/html/rfc5425



Question 6

A client device fails to see the enterprise SSID, but other devices are connected to it.   
What is the cause of this issue?


  1. The hidden SSID was not manually configured on the client.
  2. The broadcast SSID was not manually configured on the client.
  3. The client has incorrect credentials stored for the configured hidden SSID.
  4. The client has incorrect credentials stored for the configured broadcast SSID.
Correct answer: A



Question 7

Which function does a fabric edge node perform in an SD-Access deployment?


  1. Connects the SD-Access fabric to another fabric or external Layer 3 networks
  2. Connects endpoints to the fabric and forwards their traffic 
  3. Provides reachability border nodes in the fabric underlay
  4. Encapsulates end-user data traffic into LISP.
Correct answer: B
Explanation:
There are five basic device roles in the fabric overlay: Control plane node: This node contains the settings, protocols, and mapping tables to provide the endpoint-to-location (EID-to-RLOC) mapping system for the fabric overlay.  Fabric border node: This fabric device (for example, core layer device) connects external Layer 3 networks to the SDA fabric.  Fabric edge node: This fabric device (for example, access or distribution layer device) connects wired endpoints to the SDA fabric.  Fabric WLAN controller (WLC): This fabric device connects APs and wireless endpoints to the SDA fabric.  Intermediate nodes: These are intermediate routers or extended switches that do not provide any sort of SD-Access fabric role other than underlay services.
There are five basic device roles in the fabric overlay: 
  • Control plane node: This node contains the settings, protocols, and mapping tables to provide the endpoint-to-location (EID-to-RLOC) mapping system for the fabric overlay.  
  • Fabric border node: This fabric device (for example, core layer device) connects external Layer 3 networks to the SDA fabric.  
  • Fabric edge node: This fabric device (for example, access or distribution layer device) connects wired endpoints to the SDA fabric.  
  • Fabric WLAN controller (WLC): This fabric device connects APs and wireless endpoints to the SDA fabric.  
  • Intermediate nodes: These are intermediate routers or extended switches that do not provide any sort of SD-Access fabric role other than underlay services.



Question 8

Which two methods are used by an AP that is typing to discover a wireless LAN controller? (Choose two.)


  1. Cisco Discovery Protocol neighbor
  2. broadcasting on the local subnet
  3. DNS lookup cisco-DNA-PRIMARY.local domain
  4. DHCP Option 43
  5. querying other APs
Correct answer: BD
Explanation:
A Cisco lightweight wireless AP needs to be paired with a WLC to function.    An AP must be very diligent to discover any controllers that it can join—all without any preconfiguration on your part. To accomplish this feat, several methods of discovery are used.  The goal of discovery is just to build a list of live candidate controllers that are available, using the following methods: Prior knowledge of WLCs  DHCP and DNS information to suggest some controllers (DHCP Option 43)  Broadcast on the local subnet to solicit controllers    Reference: CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide   If you do not tell the LAP where the controller is via DHCP option 43, DNS resolution of “Cisco-capwap-controller.local_domain”, or statically configure it, the LAP does not know where in the network to find the management interface of the controller.  In addition to these methods, the LAP does automatically look on the local subnet for controllers with a 255.255.255.255 local broadcast.    Reference: https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/119286-lap-notjoin-wlc-tshoot.html
A Cisco lightweight wireless AP needs to be paired with a WLC to function.    
An AP must be very diligent to discover any controllers that it can join—all without any preconfiguration on your part. To accomplish this feat, several methods of discovery are used.  
The goal of discovery is just to build a list of live candidate controllers that are available, using the following methods: 
  • Prior knowledge of WLCs  
  • DHCP and DNS information to suggest some controllers (DHCP Option 43)  
  • Broadcast on the local subnet to solicit controllers    
Reference: CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide   
If you do not tell the LAP where the controller is via DHCP option 43, DNS resolution of “Cisco-capwap-controller.local_domain”, or statically configure it, the LAP does not know where in the network to find the management interface of the controller.  
In addition to these methods, the LAP does automatically look on the local subnet for controllers with a 255.255.255.255 local broadcast.    
Reference: https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/119286-lap-notjoin-wlc-tshoot.html



Question 9

Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors?                                                        


  1. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes.
  2. Each virtual machine requires a unique IP address but shares the MAC address with the physical server
  3. Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server.
  4. Each virtual machine requires a unique MAC address but shares the IP address with the physical server.
Correct answer: A
Explanation:
A virtual machine (VM) is a software emulation of a physical server with an operating system.  From an application’s point of view, the VM provides the look  and feel of a real physical server, including all its components, such as CPU, memory, and network interface cards (NICs).  The virtualization software that creates VMs and performs the hardware abstraction that allows multiple VMs to run concurrently is known as a hypervisor.  There are two types of hypervisors: type 1 and type 2 hypervisor. In type 1 hypervisor (or native hypervisor), the hypervisor is installed directly on the physical server. Then instances of an operating system (OS) are installed on the hypervisor. Type 1 hypervisor has direct access to the hardware resources. Therefore they are more efficient than hosted architectures. Some examples of type 1 hypervisor are VMware vSphere/ESXi, Oracle VM Server, KVM and Microsoft Hyper-V.  In contrast to type 1 hypervisor, a type 2 hypervisor (or hosted hypervisor) runs on top of an operating system and not the physical hardware directly. A big advantage of Type 2 hypervisors is that management console software is not required.
A virtual machine (VM) is a software emulation of a physical server with an operating system.  
From an application’s point of view, the VM provides the look  
and feel of a real physical server, including all its components, such as CPU, memory, and network interface cards (NICs).  
The virtualization software that creates VMs and performs the hardware abstraction that allows multiple VMs to run concurrently is known as a hypervisor.  
There are two types of hypervisors: type 1 and type 2 hypervisor. 
In type 1 hypervisor (or native hypervisor), the hypervisor is installed directly on the physical server. Then instances of an operating system (OS) are installed on the hypervisor. Type 1 hypervisor has direct access to the hardware resources. Therefore they are more efficient than hosted architectures. Some examples of type 1 hypervisor are VMware vSphere/ESXi, Oracle VM Server, KVM and Microsoft Hyper-V.  
In contrast to type 1 hypervisor, a type 2 hypervisor (or hosted hypervisor) runs on top of an operating system and not the physical hardware directly. A big advantage of Type 2 hypervisors is that management console software is not required.



Question 10

Which LISP infrastructure device provides connectivity between non-sites and LISP sites by receiving non-LISP traffic with a LISP site destination?


  1. PETR
  2. PITR
  3. map resolver
  4. map server
Correct answer: B
Explanation:
Proxy ingress tunnel router (PITR): A PITR is an infrastructure LISP network entity that receives packets from non-LISP sites and encapsulates the packets to LISP sites or natively forwards them to non-LISP sites.  Reference: https://www.ciscopress.com/articles/article.asp?p=2992605
Proxy ingress tunnel router (PITR): A PITR is an infrastructure LISP network entity that receives packets from non-LISP sites and encapsulates the packets to LISP sites or natively forwards them to non-LISP sites.  
Reference: https://www.ciscopress.com/articles/article.asp?p=2992605









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files