Exams > Cisco > 350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR)
350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR)
Page 20 out of 62 pages Questions 191-200 out of 614 questions
Question#191

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

  • A. SSL
  • B. Cisco TrustSec
  • C. MACsec
  • D. IPsec
Discover Answer Hide Answer

C

Question#192

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web
Policy.
Which device presents the web authentication for the WLAN?

  • A. ISE server
  • B. RADIUS server
  • C. anchor WLC
  • D. local WLC
Discover Answer Hide Answer

D

Question#193

Which method does the enable secret password option use to encrypt device passwords?

  • A. MD5
  • B. PAP
  • C. CHAP
  • D. AES
Discover Answer Hide Answer

A
Reference:
https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/107614-64.html

Question#194

On which protocol or technology is the fabric data plane based in Cisco SD-Access fabric?

  • A. VXLAN
  • B. LISP
  • C. Cisco TrustSec
  • D. IS-IS
Discover Answer Hide Answer

A

Question#195

What is the difference between the enable password and the enable secret password when service password encryption is enabled on an IOS device?

  • A. The enable secret password is protected via stronger cryptography mechanisms.
  • B. The enable password cannot be decrypted.
  • C. The enable password is encrypted with a stronger encryption method.
  • D. There is no difference and both passwords are encrypted identically.
Discover Answer Hide Answer

A

Question#196

Which access control list allows only TCP traffic with a destination port range of 22-443, excluding port 80?

  • A. deny tcp any any eq 80 permit tcp any any gt 21 lt 444
  • B. permit tcp any any range 22 443 deny tcp any any eq 80
  • C. permit tcp any any eq 80
  • D. deny tcp any any eq 80 permit tcp any any range 22 443
Discover Answer Hide Answer

D

Question#197

A network administrator applies the following configuration to an IOS device: aaa new-model aaa authentication login default local group tacacs+
What is the process of password checks when a login attempt is made to the device?

  • A. A TACACS+ server is checked first. If that check fails, a local database is checked.
  • B. A TACACS+ server is checked first. If that check fails, a RADIUS server is checked. If that check fails, a local database is checked.
  • C. A local database is checked first. If that check fails, a TACACS+ server is checked. If that check fails, a RADIUS server is checked.
  • D. A local database is checked first. If that check fails, a TACACS+ server is checked.
Discover Answer Hide Answer

D
Reference:
https://www.cisco.com/c/en/us/support/docs/security-vpn/terminal-access-controller-access-control-system-tacacs-/200606-aaa-authentication-login- default-local.html

Question#198

Refer to the exhibit.

Assuming the WLC's interfaces are not in the same subnet as the RADIUS server, which interface would the WLC use as the source for all RADIUS-related traffic?

  • A. the controller management interface
  • B. the controller virtual interface
  • C. the interface specified on the WLAN configuration
  • D. any interface configured on the WLC
Discover Answer Hide Answer

C

Question#199

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

  • A. Cisco Firepower and FireSIGHT
  • B. Cisco Stealthwatch system
  • C. Advanced Malware Protection
  • D. Cisco Web Security Appliance
Discover Answer Hide Answer

B

Question#200

An engineer must protect their company against ransomware attacks.
Which solution allows the engineer to block the execution stage and prevent file encryption?

  • A. Use Cisco Firepower and block traffic to TOR networks.
  • B. Use Cisco AMP deployment with the Malicious Activity Protection engine enabled.
  • C. Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation.
  • D. Use Cisco AMP deployment with the Exploit Prevention engine enabled.
Discover Answer Hide Answer

B

chevron rightPrevious Nextchevron right