Skip to Content

Cisco ENCOR 350-401 Exam Questions and Answers – Page 1

The latest Cisco CCNP and CCIE Enterprise Core: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) 350-401 certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Cisco CCNP and CCIE Enterprise Core: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) 350-401 exam and earn Cisco CCNP and CCIE Enterprise Core: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) 350-401 certification.

Exam Question 31

What it the purpose of the LISP routing and addressing architecture?

A. It creates two entries for each network node, one for its identity and another for its location on the network.
B. It allows LISP to be applied as a network virtualization overlay though encapsulation.
C. It allows multiple instances of a routing table to co-exist within the same router.
D. It creates head-end replication used to deliver broadcast and multicast frames to the entire network.
Correct Answer:
A. It creates two entries for each network node, one for its identity and another for its location on the network.

Exam Question 32

What function does VXLAN perform in a Cisco SD-Access deployment?

A. policy plane forwarding
B. control plane forwarding
C. data plane forwarding
D. systems management and orchestration
Correct Answer:
C. data plane forwarding

Exam Question 33

MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces.
MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces.
What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?

A. The packet is discarded on router B
B. The packet arrives on router C without fragmentation
C. The packet arrives on router C fragmented
D. The packet is discarded on router A
Correct Answer:
C. The packet arrives on router C fragmented

Exam Question 34

Which entity is responsible for maintaining Layer 2 isolation between segments in a VXLAN environment?

A. VNID
B. switch fabric
C. VTEP
D. host switch
Correct Answer:
A. VNID

Exam Question 35

What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?

A. mainframe
B. host
C. virtual machine
D. container
Correct Answer:
C. virtual machine

Exam Question 36

The following system log message is presented after a network administrator configures a GRE tunnel:
%TUN-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing
Why is Tunnel 0 disabled?

A. Because dynamic routing is not enabled.
B. Because the tunnel cannot reach its tunnel destination.
C. Because the best path to the tunnel destination is through the tunnel itself.
D. Because the router cannot recursively identify its egress forwarding interface.
Correct Answer:
C. Because the best path to the tunnel destination is through the tunnel itself.

Exam Question 37

What is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?

A. better application performance
B. improved security because the underlying OS is eliminated
C. improved density and scalability
D. ability to operate on hardware that is running other OSs
Correct Answer:
D. ability to operate on hardware that is running other OSs

Exam Question 38

Refer to the exhibit. A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).
A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this?

A. Create an IPsec profile, associate the transform-set ACL, and apply the profile to the tunnel interface.
B. Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4.
C. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL.
D. Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.
E. Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24.
Correct Answer:
B. Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4.
D. Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.

Exam Question 39

What is the responsibility of a secondary WLC?

A. It enables Layer 2 and Layer 3 roaming between itself and the primary controller.
B. It registers the LAPs if the primary controller fails.
C. It avoids congestion on the primary controller by sharing the registration load on the LAPs.
D. It shares the traffic load of the LAPs with the primary controller.
Correct Answer:
A. It enables Layer 2 and Layer 3 roaming between itself and the primary controller.

Exam Question 40

Which two methods are used to reduce the AP coverage area? (Choose two.)

A. Reduce channel width from 40 MHz to 20 MHz.
B. Reduce AP transmit power.
C. Enable Fastlane.
D. Increase minimum mandatory data rate.
E. Disable 2.4 GHz and use only 5 GHz.
Correct Answer:
A. Reduce channel width from 40 MHz to 20 MHz.
B. Reduce AP transmit power.