350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR) Part 8
Question #: 491
Topic #: 1
In Cisco DNA Center what is the integration API?
A. southbound consumer-facing RESTful API, which enables network discovery and configuration management
B. westbound interface, which allows the exchange of data to be used by ITSM, IPAM and reporting
C. an interface between the controller and the network devices, which enables network discovery and configuration management
D. northbound consumer-facing RESTful API which enables network discovery and configuration management
Selected Answer: B
Question #: 492
Topic #: 1
An engineer must configure a new WLAN that allows a user to enter a passphrase and provides forward secrecy as a security measure. Which Layer 2 WLAN configuration is required on the Cisco WLC?
A. WPA3 Enterprise
B. WPA2 Personal
C. WPA2 Enterprise
D. WPA3 Personal
Selected Answer: D
Question #: 493
Topic #: 1
How does an on-premises infrastructure compare to a cloud infrastructure?
A. On-premises offers faster deployment than cloud.
B. On-premises requires less power and cooling resources than cloud.
C. On-premises offers lower latency for physically adjacent systems than cloud.
D. On-premises can increase compute power faster than cloud.
Selected Answer: C
Question #: 494
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
Select and Place:
Suggestion Answer:
Question #: 495
Topic #: 1
An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:
✑ Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address operating system type, and CLI remote access protocol.
✑ After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.
The contents of the JSON-formatted file are as follows:
Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 496
Topic #: 1
Refer to the exhibit. An engineer configures HSRP and enters the show standby command. Which two facts about the network environment are derived from the output? (Choose two.)
A. If the local device fails to receive a hello from the active router for more than 5 seconds, it becomes the active router.
B. If a router with a higher IP address and same HSRP priority as the active router becomes available that router becomes the new active router 5 seconds later.
C. The virtual IP address of the HSRP group is 10.1.1.1.
D. The hello and hold timers are set to custom values.
E. The local device has a higher priority setting than the active router.
Selected Answer: BC
Question #: 497
Topic #: 1
Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?
A. R2(config)#interface Gi0/0 R2(config-if)#ip ospf cost 1
B. R1(config)#router ospf 1 R1(config-if)#network 172.20.0.0 0.0.0.255 area 1
C. R1(config)#router ospf 1 R1(config-router)#no passive-interface Gi0/0
D. R2(config)#router ospf 1 R2(config-router)#passive-interface Gi0/0
Selected Answer: C
Question #: 498
Topic #: 1
Refer to the exhibit. After configuring the BGP network an engineer verifies that the path between Server1 and Server2 is functional. Why did RouterSF choose the route from RouterDAL instead of the route from RouterCHI?
A. BGP is not running on RouterCHI
B. There is a static route in RouterSF for 10.0.0.0/24
C. The route from RouterDAL has a lower MED
D. The Router-ID for Router DAL is lower than the Router-ID for RouterCHI
Selected Answer: D
Question #: 499
Topic #: 1
DRAG DROP –
Drag and drop the LISP components on the left to the correct description on the right.
Select and Place:
Suggestion Answer:
Question #: 500
Topic #: 1
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
A. When VRFs are used, ARP protocol must be enabled in each VRF.
B. The ping command must be executed in the global routing table.
C. Interface FastEthernet0/0 is configured in VRF CUST-A, so the ARP entry is also in that VRF.
D. When VRFs are used, ARP protocol is disabled in the global routing table.
Selected Answer: B
Question #: 501
Topic #: 1
Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?
A. 43
B. 52
C. 60
D. 82
Selected Answer: B
Question #: 502
Topic #: 1
A customer deploys a new wireless network to perform location-based services using Cisco DNA Spaces. The customer has a single WLC located on-premises in a secure data center. The security team does not want to expose the WLC to the public Internet. Which solution allows the customer to securely send RSSI updates to Cisco DNA Spaces?
A. Deploy a Cisco DNA Spaces connector as a VM
B. Perform tethering with Cisco DNA Center
C. Replace the WLC with a cloud-based controller
D. Implement Cisco Mobility Services Engine
Selected Answer: A
Question #: 503
Topic #: 1
Refer to the exhibit. An engineer entered the command no spanning-tree bpduguard enable on interface Fa1/0/7. What is the effect of this command on
Fa1/0/7?
A. It remains in err-disabled state until the errdisable recovery cause failed-port-state command is entered in the global configuration mode
B. It remains in err-disabled state until the no shutdown command is entered in the interface configuration mode
C. It remains in err-disabled state until the shutdown/no shutdown command is entered in the interface configuration mode
D. It remains in err-disabled state until the spanning-tree portfast bpduguard disable command is entered in the interface configuration mode.
Selected Answer: C
Question #: 504
Topic #: 1
Which design principle states that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
A. least privilege
B. fail-safe defaults
C. economy of mechanism
D. complete mediation
Selected Answer: B
Question #: 505
Topic #: 1
A customer wants to connect a device to an autonomous Cisco AP configured as a WGB. The WGB is configured properly: however, it fails to associate to a
CAPWAP-enabled AP. Which change must be applied in the advanced WLAN settings to resolve this issue?
A. Enable Aironet IE.
B. Enable passive client.
C. Disable AAA override.
D. Disable FlexConnect local switching.
Selected Answer: A
Question #: 506
Topic #: 1
By default, which virtual MAC address does HSRP group 32 use?
A. 04:19:01:05:2e:32
B. 05:5e:5c:ac:0c:32
C. 00:00:0c:07:ac:20
D. 00:5e:0c:07:ac:20
Selected Answer: C
Question #: 507
Topic #: 1
Which two Cisco SD-WAN components exchange OMP information? (Choose two.)
A. WAN Edge
B. vBond
C. vManage
D. vAnalytics
E. vSmart
Selected Answer: AE
Question #: 508
Topic #: 1
What does the number in an NTP stratum level represent?
A. The number of hops it takes to reach the authoritative time source
B. The amount of offset between the device clock and true time
C. The number of hops it takes to reach the primary time server
D. The amount of drift between the device clock and true time
Selected Answer: A
Question #: 509
Topic #: 1
Refer to the exhibit. Clients report that they cannot connect to this SSID using the provided PSK. Which action will resolve this issue?
A. Apply the correct interface to this WLAN
B. Apply the changes this SSID
C. Select the PSK under authentication key management
D. Define the correct Radio Policy.
Selected Answer: C
Question #: 510
Topic #: 1
Which QoS queuing method transmits packets out of the interface in the order the packets arrive?
A. custom
B. weighted-fair
C. FIFO
D. priority
Selected Answer: C
Question #: 511
Topic #: 1
Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two.)
A. Users lose connectivity
B. Already connected users are unaffected but new users cannot connect
C. All devices reload after detecting loss of connection to Cisco DNA Center
D. User connectivity is unaffected
E. Cisco DNA Center is unable to collect monitoring data in Assurance
Selected Answer: DE
Question #: 512
Topic #: 1
Refer to the exhibit. The connection between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two.)
A. configure switchport nonegotiate on SW1
B. configure switchport nonegotiate on SW2
C. configure switchport mode access on SW2
D. configure switchport mode trunk on SW2
E. configure switchport mode dynamic desirable on SW2
Selected Answer: DE
Question #: 513
Topic #: 1
Refer to the exhibit. A company has an internal wireless network with a hidden SSID and RADIUS-based client authentication for increased security. An employee attempts to manually add the company network to a laptop, but the laptop does not attempt to connect to the network. The regulatory domains of the access points and the laptop are identical. Which action resolves this issue?
A. Ensure that the “Connect even if this network is not broadcasting” option is selected.
B. Change the security type to WPA2-Personal AES.
C. Use the empty string as the hidden SSID network name.
D. Limit the enabled wireless channels on the laptop to the maximum channel range that is supported by the access points.
Selected Answer: A
Question #: 514
Topic #: 1
How do the RIB and the FIB differ?
A. RIB is derived from the control plane, and the FIB is derived from the RIB.
B. FIB is derived from the control plane, and the RIB is derived from the data plane.
C. RIB contains the interface for a destination, and the FIB contains the next hop information.
D. FIB contains routes learned through a dynamic routing protocol and the RIB contains routes that are static or directly connected.
Selected Answer: A
Question #: 515
Topic #: 1
What does a YANG model provide?
A. standardized data structure independent of the transport protocols
B. creation of transport protocols and their interaction with the OS
C. user access to interact directly with the CLI of the device to receive or modify network configurations
D. standardized data structure that can be used only with NETCONF or RESTCONF transport protocols
Selected Answer: A
Question #: 516
Topic #: 1
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?
A. economy of mechanism
B. complete mediation
C. separation of privilege
D. least common mechanism
Selected Answer: B
Question #: 517
Topic #: 1
Refer to the exhibit. Which command set completes the ERSPAN session configuration?
A. monitor session 11 type erspan-destination destination interface GigabitEthemet4 source erspan-id 11 ip address 10.10.10.10
B. monitor session 12 type erspan-destination destination interface GigabitEthernet4 source erspan-id 12 ip address 10.10.10.10
C. monitor session 11 type erspan-destination destination interface GigabitEthernet4 source erspan-id 12 ip address 10.100.10.10
D. monitor session 12 type erspan-destination destination interface GigabitEthernet4 source erspan-id 11 ip address 10.10.10.10
Selected Answer: B
Question #: 518
Topic #: 1
“HTTP/1.1 204 No Content” is returned when the curl -i -X DELETE command is issued. Which situation has occurred?
A. The command succeeded in deleting the object.
B. The object was located at the URI, but it could not be deleted
C. The object could not be located at the URI path.
D. The URI was invalid.
Selected Answer: A
Question #: 519
Topic #: 1
DRAG DROP –
Drag and drop the tools from the left onto the agent types on the right.
Select and Place:
Suggestion Answer:
Question #: 520
Topic #: 1
Refer to the exhibit. Which configuration is required to summarize the Area 2 networks that are advertised to Area 0?
A. RouterB(config)# router ospf 1 RouterB(config-router)# area 2 range 192.168.36.0 255.255.252.0
B. RouterB(config)# router ospf 1 RouterB(config-router)# network 192.168.38.0 255.255.255.0
C. RouterB(config)# router ospf 1 RouterB(config-router)# network 192.168.38.0 255.255.252.0
D. RouterB(config)# router ospf 1 RouterB(config-router)# area 2 range 192.168.36.0 255.255.255.0
Selected Answer: A
Question #: 521
Topic #: 1
What is the recommended minimum SNR for voice applications on wireless networks?
A. 10
B. 15
C. 20
D. 25
Selected Answer: D
Question #: 522
Topic #: 1
Refer to the exhibit. What are two results of the NAT configuration? (Choose two.)
A. Packets with a destination of 200.1.1.1 are translated to 10.1.1.1 or .2, respectively.
B. A packet that is sent to 200 1.1.1 from 10.1.1.1 is translated to 209.165.201.1 on R1.
C. R1 is performing NAT for inside addresses and outside address.
D. R1 looks at the destination IP address of packets entering S0/0 and destined for inside hosts.
E. R1 processes packets entering E0/0 and S0/0 by examining the source IP address.
Selected Answer: BD
Question #: 523
Topic #: 1
A network engineer must configure a switch to allow remote access for all feasible protocols Only a password must be requested for device authentication and all idle sessions must be terminated in 30 minutes. Which configuration must be applied?
A. line vty 0 15 password cisco transport input telnet ssh exec-timeout 30 0
B. line vty 0 15 password cisco transport input all exec-timeout 0 30
C. username cisco privilege 15 cisco line vty 0 15 transport input telnet ssh login local exec-timeout 0 30
D. line console 0 password cisco exec-timeout 30 0
Selected Answer: A
Question #: 524
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left onto the switching architectures on the right.
Select and Place:
Suggestion Answer:
Question #: 525
Topic #: 1
Refer to the exhibit. An engineer configures a trunk between SW1 and SW2 but tagged packets are not passing. Which action fixes the issue?
A. Configure SW1 with dynamic auto mode on interface FastEthernet0/1.
B. Configure the native VLAN to be the same VLAN on both switches on interface FastEthernet0/1.
C. Configure SW2 with encapsulation dot1q on interface FastEthernet0/1.
D. Configure FastEthernet0/1 on both switches for static trunking.
Selected Answer: C
Question #: 526
Topic #: 1
When does a Cisco StackWise primary switch lose its role?
A. when a switch with a higher priority is added to the stack
B. when a stack member fails
C. when the priority value of a stack member is changed to a higher value
D. when the stack primary is reset
Selected Answer: D
Question #: 527
Topic #: 1
Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. Which command resolves the issue?
A. SW2(config-if)#switchport mode trunk
B. SW1(config-if)#channel-group 10 mode active
C. SW1(config-if)#channel-group 10 mode desirable
D. SW2(config-if)#channel-group 10 mode on
Selected Answer: B
Question #: 528
Topic #: 1
DRAG DROP –
Drag and drop the automation characteristics from the left onto the appropriate tools on the right.
Select and Place:
Suggestion Answer:
Question #: 529
Topic #: 1
How do stratum levels relate to the distance from a time source?
A. Stratum 0 devices are connected directly to an authoritative time source.
B. Stratum 1 devices are connected directly to an authoritative time source.
C. Stratum 15 devices are connected directly to an authoritative time source.
D. Stratum 15 devices are an authoritative time source.
Selected Answer: B
Question #: 530
Topic #: 1
A customer has a wireless network deployed within a multi-tenant building. The network provides client access, location-based services and is monitored using
Cisco DNA Center. The security department wants to locate and track malicious devices based on threat signatures. Which feature is required for this solution?
A. malicious rogue rules on Cisco DNA Center
B. malicious rogue rules on the WLC
C. Cisco aWIPS policies on the WLC
D. Cisco aWIPS policies on Cisco DNA Center
Selected Answer: D
Question #: 531
Topic #: 1
In a Cisco SD-Access wireless environment, which device is responsible for hosting the anycast gateway?
A. fusion router
B. control plane node
C. fabric border node
D. fabric edge node
Selected Answer: D
Question #: 532
Topic #: 1
Refer to the exhibit. The port channel between the switches does not work as expected. Which action resolves the issue?
A. Interface Gi0/1 on Switch1 must be configured as desirable.
B. Trunking must be enabled on both interfaces on Switch2.
C. Interface Gi0/0 on Switch2 must be configured as passive.
D. Interface Gi0/1 on Switch2 must be configured as active.
Selected Answer: D
Question #: 533
Topic #: 1
Refer to the exhibit. Which set of commands is required to configure and verify the VRF for Site 1 Network A on router R1?
A. R1#ip routing R1#(config)#ip vrf 100 R1#(config-vrf)#rd 100:1 R1#(config-vrf)# address family ipv4 ! R1(config)#interface Gi0/2 R1(config-if)#ip address 10.0.1.1 255.255.255.0 R1#show ip route
B. R1#ip routing R1#(config)#ip vrf 100 ! R1(config)#interface Gi0/2 R1(config-if)#ip address 10.0.1.1 255.255.255.0 R1#showip route
C. R1#ip routing R1#(config)#ip vrf 100 ! R1(config)#interface Gi0/2 R1(config-if)#ip vrf forwarding 100 R1(config-if)#ip address 10.0.1.1 255.255.255.0 R1#show ip vrf
D. R1#ip routing R1#(config)#ip vrf 100 ! R1(config)#interface Gi0/2 R1(config-if)#ip address 10.0.1.1 255.255.255.0 R1#show ip vrf
Selected Answer: C
Question #: 534
Topic #: 1
How does Protocol Independent Multicast function?
A. In sparse mode, it establishes neighbor adjacencies and sends hello messages at 5-second intervals.
B. It uses the multicast routing table to perform the multicast forwarding function.
C. It uses unicast routing information to perform the multicast forwarding function.
D. It uses broadcast routing information to perform the multicast forwarding function.
Selected Answer: C
Question #: 535
Topic #: 1
Which VXLAN component is used to encapsulate and decapsulate Ethernet frames?
A. VNI
B. GRE
C. VTEP
D. EVPN
Selected Answer: C
Question #: 536
Topic #: 1
Refer to the exhibit. Assuming all links are functional, which path does PC1 take to reach DSW1?
A. PC1 goes from ALSW1 to DSW2 to CORE to DSW1.
B. PC1 goes from ALSW1 to DSW2 to ALSW2 to DSW1.
C. PC1 goes from ALSW1 to DSW2 to DSW1.
D. PC1 goes from ALSW1 to DSW1.
Selected Answer: C
Question #: 537
Topic #: 1
By default, which virtual MAC address does HSRP group 22 use?
A. c0:41:99:98:06:16
B. 00:00:0c:07:ac:16
C. 00:00:0c:07:ac:22
D. c0:07:0c:ac:00:22
Selected Answer: B
Question #: 538
Topic #: 1
Refer to the exhibit. Both controllers are in the same mobility group. Which result occurs when client 1 roams between APs that are registered to different controllers in the same WLAN?
A. The client database entry moves from controller A to controller B
B. A CAPWAP tunnel is created between controller A and controller B
C. Client 1 uses an EoIP tunnel to contact controller A
D. Client 1 contacts controller B by using an EoIP tunnel
Selected Answer: A
Question #: 539
Topic #: 1
Where in Cisco DNA Center is documentation of each API call organized by its functional area?
A. Developer Toolkit
B. platform management
C. platform bundles
D. Runtime Dashboard
Selected Answer: A
Question #: 540
Topic #: 1
Refer to the exhibit. An engineer must protect the CPU of the router from high rates of NTP, SNMP, and SSH traffic. Which two configurations must be applied to drop these types of traffic when it continuously exceeds 320 kbps? (Choose two.)
A. R1(config-pmap)#class CLASS-CoPP-Management R1(config-pmap-c)#police 32 conform-action transmit exceed-action drop violate-action transmit
B. R1(config)#policy-map POLICY-CoPP R1(config-pmap)#class CLASS-CoPP-Management R1(config-pmap-c)#police 320000 conform-action transmit exceed-action drop violate-action drop
C. R1(config)#policy-map POLICY-CoPP R1(config-pmap)#class CLASS-CoPP-Management R1(config-pmap-c)#police 320000 conform-action transmit exceed-action transmit violate-action drop
D. R1(config)#control-plane R1(config-cp)# service-policy output POLICY-CoPP
E. R1(config)#control-plane R1(config-cp)# service-policy input POLICY-CoPP
Selected Answer: CE
Question #: 541
Topic #: 1
Which free application has the ability to make REST calls against Cisco DNA Center?
A. API Explorer
B. REST Explorer
C. Postman
D. Mozilla
Selected Answer: C
Question #: 542
Topic #: 1
If AP power level is increased from 25 mW to 100 mW, what is the power difference in dBm?
A. 6 dBm
B. 14 dBm
C. 17 dBm
D. 20 dBm
Selected Answer: A
Question #: 543
Topic #: 1
What is the result when an active route processor fails in a design that combines NSF with SSO?
A. The standby route processor temporarily forwards packets until route convergence is complete.
B. An NSF-aware device immediately updates the standby route processor RIB without churning the network.
C. An NSF-capable device immediately updates the standby route processor RIB without churning the network.
D. The standby route processor immediately takes control and forwards packets along known routes
Selected Answer: B
Question #: 544
Topic #: 1
Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?
A. show netconf rpc-reply
B. show netconf | section rpc-reply
C. show netconf schema | section rpc-reply
D. show netconf xml rpc-reply
Selected Answer: C
Question #: 545
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left to the table types on the right.
Select and Place:
Suggestion Answer:
Question #: 546
Topic #: 1
Which A record type should be configured for access points to resolve the IP address of @ wireless LAN controller using ONS?
A. CISCO.CONTROLLER localdomain
B. CISCO.CAPWAP.CONTROLLER localdomain
C. CISCO-CONTROLLER localdomain
D. CISCO-CAPWAP-CONTROLLER.localdomain
Selected Answer: D
Question #: 547
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left onto the configuration models on the right.
Select and Place:
Suggestion Answer:
Question #: 548
Topic #: 1
Which activity requires access to Cisco DNA Center CLI?
A. provisioning a wireless LAN controller
B. creating a configuration template
C. upgrading the Cisco DNA Center software
D. graceful shutdown of Cisco DNA Center
Selected Answer: D
Question #: 549
Topic #: 1
Refer to the exhibit. An engineer must configure an ERSPAN tunnel that mirrors traffic from Linux1 on Switch1 to Linux2 on Switch2. Which command must be added to the destination configuration to enable the ERSPAN tunnel?
A. (config-mon-erspan-dst-src)# erspan-id 172.16.10.10
B. (config mon erspan-dst-src)# erspan-id 110
C. (config-mon-erspan-dst-src)# no shut
D. (config-mon-erspan-dst-src)# origin ip address 172.16.10.10
Selected Answer: B
Question #: 550
Topic #: 1
What are two characteristics of Cisco SD-Access elements? (Choose two.)
A. The border node is required for communication between fabric and nonfabric devices.
B. Traffic within the fabric always goes through the control plane node.
C. Fabric endpoints are connected directly to the border node.
D. The control plane node has the full RLOC-to-EID mapping database.
E. The border node has the full RLOC-to-EID mapping database.
Selected Answer: AD
Question #: 551
Topic #: 1
When is an external antenna used inside a building?
A. only when using Mobility Express
B. only when using 2.4 GHz
C. when it provides the required coverage
D. only when using 5 GHz
Selected Answer: C
Question #: 552
Topic #: 1
Refer to the exhibit. R1 and R2 are directly connected, but the BGP session does not establish. Which action must be taken to build an eBGP session?
A. Configure no neighbor 192.168.12.1 shutdown under R2 BGP process.
B. Configure neighbor 2.2.2.2 remote-as 65002 under R1 BGP process.
C. Configure ip route 1.1.1.1 0.0.0.0 192.168.12.1 on R2.
D. Configure neighbor 192.168.12.1 activate under R2 BGP process.
Selected Answer: A
Question #: 553
Topic #: 1
A company requires a wireless solution to support its main office and multiple branch locations. All sites have local Internet connections and a link to the main office for corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?
A. Cisco DNA Spaces
B. Cisco Unified Wireless Network
C. Cisco Mobility Express
D. Cisco Catalyst switch with embedded controller
Selected Answer: B
Question #: 554
Topic #: 1
Which QoS feature uses the IP Precedence bits in the ToS field of the IP packet header to partition traffic into different priority levels?
A. marking
B. shaping
C. policing
D. classification
Selected Answer: A
Question #: 555
Topic #: 1
Refer to the exhibit. Which two commands are required on router R1 to block FTP and allow all other traffic from the Branch 2 network? (Choose two.)
A. access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp-data access-list 101 permit ip any any
B. access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp-data access-list 101 permit ip any any
C. interface GigabitEthernet0/0 ip address 10.0.0.1 255.255.255.252 ip access-group 101 out
D. access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp access-list 101 permit ip any any
E. interface GigabitEthernet0/0 ip address 10.0.101.1 255.255.255.252 ip access-group 101 in
Selected Answer: AC
Question #: 556
Topic #: 1
A company recently decided to use RESTCONF instead of NETCONF, and many of their NETCONF scripts contain the operation
(operation=”create”). Which RESTCONF operation must be used to replace these statements?
A. PUT
B. CREATE
C. GET
D. POST
Selected Answer: D
Question #: 557
Topic #: 1
An engineer is configuring RADIUS-Based Authentication with EAP MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?
A. LDAP
B. EAP-FAST
C. EAP-TLS
D. PEAP
Selected Answer: D
Question #: 558
Topic #: 1
An engineer must protect the password for the VTY lines against over-the-shoulder attacks. Which configuration should be applied?
A. line vty 0 15 password XD822j
B. service password-encryption
C. username netadmin secret 7 $1$42J31k98867Pyh4QzwXyZ4
D. username netadmin secret 9 $9$vFpMf8elb4RVV8$seZ/bDA
Selected Answer: B
Question #: 559
Topic #: 1
Refer to the exhibit. Hosts FC1, PC2; and PC3 must access resources on Server1. An engineer configures NAT on Router R1 to enable the communication and enters the show command to verify operation. Which IP address is used by the hosts when they communicate globally to Server1?
A. random addresses in the 155.1.1.0/24 range
B. 155.1.1.1
C. their own address in the 10.10.10.0/24 range
D. 155.1.1.5
Selected Answer: D
Question #: 560
Topic #: 1
Using the EIRP formula, what parameter is subtracted to determine the EIRP value?
A. transmitter power
B. antenna cable loss
C. antenna gain
D. signal-to-noise ratio
Selected Answer: B