The latest Cisco CCNP and CCIE Enterprise Core: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) 350-401 certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Cisco CCNP and CCIE Enterprise Core: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) 350-401 exam and earn Cisco CCNP and CCIE Enterprise Core: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) 350-401 certification.
Exam Question 131
What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?
A. real-time threat management to stop DDoS attacks to the core and access networks
B. real-time awareness of users, devices, and traffic on the network
C. malware control
D. dynamic threat control for web traffic
Correct Answer:
B. real-time awareness of users, devices, and traffic on the network
Exam Question 132
An engineer must configure an ACL that permits packets which include an ACK in the TCP header. Which entry must be included in the ACL?
A. access-list 110 permit tcp any any eq 21 tcp-ack
B. access-list 10 permit tcp any any eq 21 established
C. access-list 110 permit tcp any any eq 21 established
D. access-list 10 permit ip any any eq 21 tcp-ack
Correct Answer:
C. access-list 110 permit tcp any any eq 21 established
Exam Question 133
A client with IP address 209.165.201.25 must access a web server on port 80 at 209.165.200.225. To allow this traffic, an engineer must add a statement to an access control list that is applied in the inbound direction on the port connecting to the web server.
Which statement allows this traffic?
A. permit tcp host 209.165.200.225 lt 80 host 209.165.201.25
B. permit tcp host 209.165.201.25 host 209.165.200.225 eq 80
C. permit tcp host 209.165.200.225 eq 80 host 209.165.201.25
D. permit tcp host 209.165.200.225 host 209.165.201.25 eq 80
Correct Answer:
D. permit tcp host 209.165.200.225 host 209.165.201.25 eq 80
Exam Question 134
Which standard access control entry permits traffic from odd-numbered hosts in the 10.0.0.0/24 subnet?
A. permit 10.0.0.0 0.0.0.1
B. permit 10.0.0.1 0.0.0.254
C. permit 10.0.0.1 0.0.0.0
D. permit 10.0.0.0 255.255.255.254
Correct Answer:
B. permit 10.0.0.1 0.0.0.254
Exam Question 135
Refer to the exhibit. What step resolves the authentication issue?
A. use basic authentication
B. change the port to 12446
C. target 192.168.100.82 in the URI
D. restart the vsmart host
Correct Answer:
D. restart the vsmart host
Exam Question 136
Refer to the exhibit.
Security policy requires all idle exec sessions to be terminated in 600 seconds.
Which configuration achieves this goal?
A. line vty 0 15
absolute-timeout 600
B. line vty 0 15
no exec-timeout
C. line vty 0 15
exec-timeout 10 0
D. line vty 0 4
exec-timeout 600
Correct Answer:
C. line vty 0 15
exec-timeout 10 0
Exam Question 137
Refer to the exhibit.
An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router. However, the router can still ping hosts on the 209.165.200.0/24 subnet.
Which explanation of this behavior is true?
A. Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.
B. After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.
C. Only standard access control lists can block traffic from a source IP address.
D. The access control list must contain an explicit deny to block traffic from the router.
Correct Answer:
A. Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.
Exam Question 138
Which statements are used for error handling in Python?
A. try/catch
B. catch/release
C. block/rescue
D. try/except
Correct Answer:
D. try/except
Exam Question 139
How do agent-based versus agentless configuration management tools compare?
A. Agentless tools use proxy nodes to interface with slave nodes.
B. Agentless tools require no messaging systems between master and slaves.
C. Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes.
D. Agent-based tools do not require installation of additional software packages on the slave nodes.
Correct Answer:
B. Agentless tools require no messaging systems between master and slaves.
Exam Question 140
Refer to the exhibit.
Which HTTP JSON response does the Python code output give?
A. 7.0(3)|7(4)
B. 7.61
C. NameError: name ‘json’ is not defined
D. KeyError: ‘kickstart_ver_str’
Correct Answer:
A. 7.0(3)|7(4)