Exams > Cisco > 350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR)
350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR)
Page 24 out of 62 pages Questions 231-240 out of 614 questions
Question#231

Refer to the exhibit.

Security policy requires all idle exec sessions to be terminated in 600 seconds.
Which configuration achieves this goal?

  • A. line vty 0 15 absolute-timeout 600
  • B. line vty 0 15 no exec-timeout
  • C. line vty 0 15 exec-timeout 10 0
  • D. line vty 0 4 exec-timeout 600
Discover Answer Hide Answer

C

Question#232

Refer to the exhibit.

An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router. However, the router can still ping hosts on the 209.165.200.0/24 subnet.
What explains this behavior?

  • A. Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.
  • B. After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.
  • C. Only standard access control lists can block traffic from a source IP address.
  • D. The access control list must contain an explicit deny to block traffic from the router.
Discover Answer Hide Answer

A

Question#233

What is a characteristic of a next-generation firewall?

  • A. only required at the network perimeter
  • B. required in each layer of the network
  • C. filters traffic using Layer 3 and Layer 4 information only
  • D. provides intrusion prevention
Discover Answer Hide Answer

D

Question#234


Refer to the exhibit. An engineer is investigating why guest users are able to access other guest user devices when the users are connected to the customer guest
WLAN. What action resolves this issue?

  • A. implement P2P blocking
  • B. implement MFP client protection
  • C. implement Wi-Fi direct policy
  • D. implement split tunneling
Discover Answer Hide Answer

A

Question#235


Refer to the exhibit. An engineer has configured Cisco ISE to assign VLANs to clients based on their method of authentication, but this is not working as expected.
Which action will resolve this issue?

  • A. enable AAA override
  • B. set a NAC state
  • C. utilize RADIUS profiling
  • D. require a DHCP address assignment
Discover Answer Hide Answer

C

Question#236


Refer to the exhibit. Which single security feature is recommended to provide Network Access Control in the enterprise?

  • A. MAB
  • B. 802.1X
  • C. WebAuth
  • D. port security sticky MAC
Discover Answer Hide Answer

B

Question#237


Refer to the exhibit. After configuring an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?

  • A. VPN peers agreed on parameters for the ISAKMP SA.
  • B. Peers have exchanged keys, but ISAKMP SA remains unauthenticated.
  • C. ISAKMP SA is authenticated and can be used for Quick Mode.
  • D. ISAKMP SA has been created, but it has not continued to form.
Discover Answer Hide Answer

C

Question#238

Which two threats does AMP4E have the ability to block? (Choose two.)

  • A. email phishing
  • B. DDoS
  • C. Microsoft Word macro attack
  • D. SQL injection
  • E. ransomware
Discover Answer Hide Answer

AE

Question#239


Refer to the exhibit. An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts. Drag and drop the commands into the configuration to achieve these results. Some commands may be used more than once. Not all commands are used.
Select and Place:

Discover Answer Hide Answer


Question#240

An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?

  • A. username netadmin secret 5 $1$b1Ju$kZbBS1Pyh4QzwXyZ1kSZ2
  • B. username netadmin secret 9 $9$vFpMf8elb4RVV8$seZ/bDAx1uV
  • C. username netadmin secret $1$b1Ju$k406689705QzwXyZ1kSZ2
  • D. line Console 0 password $1$b1Ju$
Discover Answer Hide Answer

B
Reference:
https://learningnetwork.cisco.com/s/article/cisco-routers-password-types

chevron rightPrevious Nextchevron right