Exams > Cisco > 350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR)
350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR)
Page 18 out of 62 pages Questions 171-180 out of 614 questions
Question#171

A network engineer is configuring Flexible NetFlow and enters these commands. sampler NetFlow1 mode random one-out-of 100 interface fastethernet 1/0 flow-sampler NetFlow1
What are two results of implementing this feature instead of traditional NetFlow? (Choose two.)

  • A. Only the flows of top 100 talkers are exported.
  • B. CPU and memory utilization are reduced.
  • C. The number of packets to be analyzed are reduced.
  • D. The data export flow is more secure.
  • E. The accuracy of the data to be analyzed is improved.
Discover Answer Hide Answer

BC

Question#172


Refer to the exhibit. An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added?

  • A. under the interface
  • B. under the flow record
  • C. under the flow monitor
  • D. under the flow exporter
Discover Answer Hide Answer

D

Question#173

A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process.
Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)

  • A. Configure the logging synchronous global configuration command.
  • B. Configure the logging synchronous command under the vty.
  • C. Increase the number of lines on the screen using the terminal length command.
  • D. Configure the logging delimiter feature.
  • E. Press the TAB key to reprint the command in a new line.
Discover Answer Hide Answer

BE

Question#174

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

  • A. logging host 10.2.3.4 vrf mgmt transport tcp port 514
  • B. logging host 10.2.3.4 vrf mgmt transport udp port 514
  • C. logging host 10.2.3.4 vrf mgmt transport tcp port 6514
  • D. logging host 10.2.3.4 vrf mgmt transport udp port 6514
Discover Answer Hide Answer

C
Reference:
https://tools.ietf.org/html/rfc5425

Question#175

Refer to this output.
R1# *Feb 14 37:09:53.129: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to up
What is the logging severity level?

  • A. notification
  • B. emergency
  • C. critical
  • D. alert
Discover Answer Hide Answer

A

Question#176

An engineer reviews a router's logs and discovers the following entry. What is the event's logging severity level?
Router# *Jan 01 38:24:04.401: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to up

  • A. error
  • B. warning
  • C. informational
  • D. notification
Discover Answer Hide Answer

A

Question#177

Refer to the exhibit.

An engineer must configure a SPAN session.
What is the effect of the configuration?

  • A. Traffic received on VLANs 10, 11, and 12 is copied and sent to interface g0/1.
  • B. Traffic sent on VLANs 10 and 12 only is copied and sent to interface g0/1.
  • C. Traffic sent on VLANs 10, 11, and 12 is copied and sent to interface g0/1.
  • D. Traffic received on VLANs 10 and 12 only is copied and sent to interface g0/1.
Discover Answer Hide Answer

A

Question#178

Refer to the exhibit.

These commands have been added to the configuration of a switch.
Which command flags an error if it is added to this configuration?

  • A. monitor session 1 source interface port-channel 6
  • B. monitor session 1 source vlan 10
  • C. monitor session 1 source interface FastEthemet0/1 rx
  • D. monitor session 1 source interface port-channel 7, port-channel 8
Discover Answer Hide Answer

B

Question#179

Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?

  • A. It creates device packs through the use of an SDK.
  • B. It uses an API call to interrogate the devices and register the returned data.
  • C. It obtains MIBs from each vendor that details the APIs available.
  • D. It imports available APIs for the non-Cisco device in a CSV format.
Discover Answer Hide Answer

A

Question#180


Refer to the exhibit. Cisco DNA Center has obtained the username of the client and the multiple devices that the client is using on the network. How is Cisco DNA
Center getting these context details?

  • A. Those details are provided to Cisco DNA Center by the Identity Services Engine.
  • B. The administrator had to assign the username to the IP address manually in the user database tool on Cisco DNA Center.
  • C. Cisco DNA Center pulled those details directly from the edge node where the user connected.
  • D. User entered those details in the Assurance app available on iOS and Android devices.
Discover Answer Hide Answer

C

chevron rightPrevious Nextchevron right