IT認証試験問題集
毎月、ITshikenは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / 350-401 問題集  / 350-401 問題練習

Cisco 350-401 問題練習

Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) 試験

最新更新時間: 2021/01/07,合計160問。

2021新年のギフト:350-401 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、350-401 問題集を使用してください。

 / 11

Question No : 1
Which configuration restricts the amount of SSH that a router accepts 100 kbps?

正解:
Explanation:
CoPP protects the route processor on network devices by treating route processor resources as a separate entity with its own ingress interface (and in some implementations, egress also). CoPP is used to police traffic that is destined to the route processor of the router such as:
+ routing protocols like OSPF, EIGRP, or BGP.
+ Gateway redundancy protocols like HSRP, VRRP, or GLBP.
+ Network management protocols like telnet, SSH, SNMP, or RADIUS.



Therefore we must apply the CoPP to deal with SSH because it is in the management plane. CoPP must be put under “control-plane” command.

Question No : 2
Refer to the exhibit.



Which type of antenna does the radiation pattern represent?

正解:
Explanation:
A Yagi antenna is formed by driving a simple antenna, typically a dipole or dipolelike antenna, and shaping the beam using a well-chosen series of non-driven elements whose length and spacing are tightly controlled.


Question No : 3
Drag and drop the Qos mechanisms from the left to the correct descriptions on the right



正解:

Question No : 4
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?

正解:
Explanation:
Cisco TrustSec uses tags to represent logical group privilege. This tag, called a Security Group Tag (SGT), is used in access policies. The SGT is understood and is used to enforce traffic by Cisco switches, routers and firewalls. Cisco TrustSec is defined in three phases: classification, propagation and enforcement.
When users and devices connect to a network, the network assigns a specific security group. This process is called classification. Classification can be based on theresults of the authentication
or by associating the SGT with an IP, VLAN, or port-profile(-> Answer 'security group tag ACL assigned to each port on a switch' and answer 'security group tag number assigned to each user on a switch' are not correct as they say “assigned … on a switch” only. Answer 'security group tag ACL assigned to each router on a network' is not correct either as it says “assigned to each router”).

Question No : 5
Refer to the exhibit.



Which LISP component do routers in the public IP network use to forward traffic between the two networks?

正解:
Explanation:
Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the use of two namespaces instead of a single IP address:
+ Endpoint identifiers (EIDs) C assigned to end hosts.
+ Routing locators (RLOCs) C assigned to devices (primarily routers) that make up the global routing system.

Question No : 6
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?
A)



B)



C)



D)



正解:

Question No : 7
Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?

正解:

Question No : 8
Refer to the exhibit.



An engineer must deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times.
Which command accomplish this task?

正解:
Explanation:
We cannot filter traffic that is originated from the local router (R3 in this case) so we can only configure the ACL on R1 or R2. “Weekend hours” means from Saturday morning through Sunday night so we have to configure: “periodic weekend 00:00 to 23:59”.
Note: The time is specified in 24-hour time (hh:mm), where the hours range from 0 to 23 and the minutes range from 0 to 59.

Question No : 9
Which protocol does REST API rely on to secure the communication channel?

正解:
Explanation:
The REST API accepts and returns HTTP (not enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents. You can use any programming language to generate the messages and the JSON or XML documents that
contain the API methods or Managed Object (MO) descriptions.

Question No : 10
Refer to the exhibit.



An engineer is installing a new pair of routers in a redundant configuration.
Which protocol ensures that traffic is not disrupted in the event of a hardware failure?

正解:

Question No : 11
When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time.
Which configuration issue would cause this problem?

正解:
Explanation:
A prerequisite for configuring Mobility Groups is “All controllers must be configured with the same virtual interface IP address”. If all the controllers within a mobility group are not using the same virtual interface, inter-controller roaming may appear to work, but the handoff does not complete, and the client loses connectivity for a period of time. -> Answer B is correct.

Question No : 12
Refer to the exhibit.



Which two statements about the EEM applet configuration are true? (Choose two.)

正解:
Explanation:
When you use thesync yesoption in the event cli command, the EEM applet runs before the CLI command is executed. The EEM applet should set the _exit_status variable to indicate whether the CLI command should be executed (_exit_status set to one) or not (_exit_status set to zero).
With thesync nooption, the EEM applet is executed in background in parallel with the CLI
command.

Question No : 13
Refer to the exhibit.



Which type of antenna do the radiation patterns present?

正解:

Question No : 14
Drag the drop the description from the left onto the routing protocol they describe on the right.



正解:


Explanation:
Unlike OSPF where we can summarize only on ABR or ASBR, in EIGRP we can summarize anywhere. Manual summarization can be applied anywhere in EIGRP domain, on every router, on every interface via the ip summary-address eigrp as-number address mask [administrative-distance] command (for example: ip summary-address eigrp 1 192.168.16.0 255.255.248.0). Summary route will exist in routing table as long as at least one more specific route will exist. If the last specific route will disappear, summary route also will fade out. The metric used by EIGRP manual summary route is the minimum metric of the specific routes.

Question No : 15
A network administrator is preparing a Python scrip to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running.
Which operation of he in client manager prevent colleague making changes to the device while the scrip is running?

正解:
Explanation:
The example below shows the usage of lock command:
def demo(host, user, names):
With manager. Connect(host=host, port=22, username=user) as m:
With m.locked(target=’running’):
for n in names:
m.edit_config (target=’running’, config=template % n)
The command “m.locked (target=’running’)” causes a lock to be acquired on the
running datastore.

 / 11