Exams > Cisco > 350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR)
350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR)
Page 22 out of 62 pages Questions 211-220 out of 614 questions
Question#211

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?

  • A. It is leveraged for dynamic endpoint to group mapping and policy definition.
  • B. It provides GUI management and abstraction via apps that share context.
  • C. It is used to analyze endpoint to app flows and monitor fabric status.
  • D. It manages the LISP EID database.
Discover Answer Hide Answer

A

Question#212

DRAG DROP -
Drag and drop the solutions that compromise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.
Select and Place:

Discover Answer Hide Answer


Question#213

DRAG DROP -
An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used.

R1#sh run | i aaa -
aaa new-model
aaa authentication login default group ACE group AAA_RADIUS local-case aaa session-id common
R1#
Select and Place:

Discover Answer Hide Answer


Question#214

What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?

  • A. real-time threat management to stop DDoS attacks to the core and access networks
  • B. real-time awareness of users, devices, and traffic on the network
  • C. malware control
  • D. dynamic threat control for web traffic
Discover Answer Hide Answer

B

Question#215

An engineer must configure an ACL that permits packets which include an ACK in the TCP header. Which entry must be included in the ACL?

  • A. access-list 110 permit tcp any any eq 21 tcp-ack
  • B. access-list 10 permit tcp any any eq 21 established
  • C. access-list 110 permit tcp any any eq 21 established
  • D. access-list 10 permit ip any any eq 21 tcp-ack
Discover Answer Hide Answer

C

Question#216

A client with IP address 209.165.201.25 must access a web server on port 80 at 209.165.200.225. To allow this traffic, an engineer must add a statement to an access control list that is applied in the inbound direction on the port connecting to the web server.
Which statement allows this traffic?

  • A. permit tcp host 209.165.200.225 lt 80 host 209.165.201.25
  • B. permit tcp host 209.165.201.25 host 209.165.200.225 eq 80
  • C. permit tcp host 209.165.200.225 eq 80 host 209.165.201.25
  • D. permit tcp host 209.165.200.225 host 209.165.201.25 eq 80
Discover Answer Hide Answer

D

Question#217

Which standard access control entry permits traffic from odd-numbered hosts in the 10.0.0.0/24 subnet?

  • A. permit 10.0.0.0 0.0.0.1
  • B. permit 10.0.0.1 0.0.0.254
  • C. permit 10.0.0.1 0.0.0.0
  • D. permit 10.0.0.0 255.255.255.254
Discover Answer Hide Answer

B

Question#218

Refer to the exhibit.

An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthernet 0/1.
Which configuration command set will allow this traffic without disrupting existing traffic flows?
A.

B.

C.

D.

Discover Answer Hide Answer

D

Question#219

Which configuration restricts the amount of SSH traffic that a router accepts to 100 kbps?
A.

B.

C.

D.

Discover Answer Hide Answer

C

Question#220


Refer to the exhibit. What step resolves the authentication issue?

  • A. use basic authentication
  • B. change the port to 12446
  • C. target 192.168.100.82 in the URI
  • D. restart the vsmart host
Discover Answer Hide Answer

D

chevron rightPrevious Nextchevron right