Exams > Cisco > 350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR)
350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR)
Page 19 out of 62 pages Questions 181-190 out of 614 questions
Question#181

Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?

  • A. monitor session 2 source interface gigabitethernet0/3 rx monitor session 2 filter vlan 3
  • B. monitor session 2 source interface gigabitethernet0/3 rx monitor session 2 filter vlan 1 - 2, 4 - 4094
  • C. monitor session 2 source interface gigabitethernet0/3 tx monitor session 2 filter vlan 3
  • D. monitor session 2 source interface gigabitethernet0/3 tx monitor session 2 filter vlan 1- 2, 4 - 4094
Discover Answer Hide Answer

C

Question#182


Refer to the exhibit. What is required to configure a second export destination for IP address 192.168.10.1?

  • A. Specify a different UDP port.
  • B. Specify a different TCP port.
  • C. Configure a version 5 flow-export to the same destination.
  • D. Specify a different flow ID.
  • E. Specify a VRF.
Discover Answer Hide Answer

A

Question#183


Refer to the exhibit. After implementing the configuration, 172.20.20.2 stops replying to ICMP echos, but the default route fails to be removed. What is the reason for this behavior?

  • A. The threshold value is wrong.
  • B. The source-interface is configured incorrectly.
  • C. The destination must be 172.30.30.2 for icmp-echo.
  • D. The default route is missing the track feature.
Discover Answer Hide Answer

D

Question#184

Refer to the exhibit.

An engineer is troubleshooting a connectivity issue and executes a traceroute. What does the result confirm?

  • A. The destination port is unreachable.
  • B. The probe timed out.
  • C. The destination server reported it is too busy.
  • D. The protocol is unreachable.
Discover Answer Hide Answer

B
In Cisco routers, the codes for a traceroute command reply are:
! ג€" success
* ג€" time out

N ג€" network unreachable -

H ג€" host unreachable -

P ג€" protocol unreachable -

A ג€" admin denied -
Q ג€" source quench received (congestion)
? ג€" unknown (any other ICMP message). In Cisco routers, the codes for a traceroute command reply are:
! ג€" success
* ג€" time out

N ג€" network unreachable -

H ג€" host unreachable -

P ג€" protocol unreachable -

A ג€" admin denied -
Q ג€" source quench received (congestion)
? ג€" unknown (any other ICMP message)

Question#185

Which Cisco DNA Center application is responsible for group-based access control permissions?

  • A. Provision
  • B. Design
  • C. Assurance
  • D. Policy
Discover Answer Hide Answer

D
Reference:
https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/1-3-1-0/user_guide/ b_cisco_dna_center_ug_1_3_1_0/b_cisco_dna_center_ug_1_3_1_0_chapter_01011.html

Question#186

An engineer is concerned with the deployment of a new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?

  • A. Router(config)# ip sla responder udp-connect 172.29.139.134 5000
  • B. Router(config)# ip sla responder tcp-connect 172.29.139.134 5000
  • C. Router(config)# ip sla responder udp-echo 172.29.139.134 5000
  • D. Router(config)# ip sla responder tcp-echo 172.29.139.134 5000
Discover Answer Hide Answer

C

Question#187

Which NGFW mode blocks flows crossing the firewall?

  • A. tap
  • B. inline
  • C. passive
  • D. inline tap
Discover Answer Hide Answer

B
Reference:
https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200924-configuring-firepower-threat-defense-int.html

Question#188

How does Cisco TrustSec enable more flexible access controls for dynamic networking environments and data centers?

  • A. uses flexible NetFlow
  • B. assigns a VLAN to the endpoint
  • C. classifies traffic based on advanced application recognition
  • D. classifies traffic based on the contextual identity of the endpoint rather than its IP address
Discover Answer Hide Answer

D
Reference:
https://www.cisco.com/c/dam/en/us/products/collateral/security/identity-services-engine/at_a_glance_c45-726831.pdf

Question#189

The login method is configured on the VTY lines of a router with these parameters:
* The first method for authentication is TACACS
* If TACACS is unavailable, login is allowed without any provided credentials
Which configuration accomplishes this task?
A.

B.

C.

D.

Discover Answer Hide Answer

D

Question#190

Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?

  • A. security group tag ACL assigned to each port on a switch
  • B. security group tag number assigned to each user on a switch
  • C. security group tag number assigned to each port on a network
  • D. security group tag ACL assigned to each router on a network
Discover Answer Hide Answer

B
Reference:
https://www.cisco.com/c/dam/en/us/solutions/collateral/borderless-networks/trustsec/C07-730151-00_overview_of_trustSec_og.pdf

chevron rightPrevious Nextchevron right