Category Archives: 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR)

350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) Question and Answers

Which action is the vSmart controller responsible for in a Cisco SD-WAN deployment?

A. onboard WAN Edge nodes into the Cisco SD-WAN fabric B. gather telemetry data from WAN Edge routers C. distribute policies that govern data forwarding performed within the Cisco SD-WAN fabric D. handle, maintain, and gather configuration and status for nodes within the Cisco SD-WAN fabric Answer: Option C. Explanation:  No answer description available for this question Show… Read More »

Where is radio resource management performed in a Cisco SD-Access wireless solution?

A. DNA Center B. control plane node C. wireless controller D. Cisco CMX Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post Where is radio resource management performed in a Cisco SD-Access wireless solution? appeared first on Majanto.

In a Cisco SD-Access wireless architecture, which device manages endpoint ID to edge node bindings?

A. fabric control plane node B. fabric wireless controller C. fabric border node D. fabric edge node Answer: Option A. Explanation:  No answer description available for this question Show AnswerDiscussion The post In a Cisco SD-Access wireless architecture, which device manages endpoint ID to edge node bindings? appeared first on Majanto.

Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?

A. underlay network B. VPN routing/forwarding C. easy virtual network D. overlay network Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture? appeared first on Majanto.

Which element enables communication between guest VMs within a virtualized environment?

A. hypervisor B. virtual router C. vSwitch D. pNIC Answer: Option C. Explanation:  Each VM is provided with a virtual NIC (vNIC) that is connected to the virtual switch. Multiple vNICs can connect to a single vSwitch, allowing VMs on a physical host to communicate with one another at layer 2 without having to go out to a… Read More »

What are two considerations when using SSO as a network redundancy feature? (Choose two.)

A. requires synchronization between supervisors in order to guarantee continuous connectivity B. the multicast state is preserved during switchover C. must be combined with NSF to support uninterrupted Layer 3 operations D. both supervisors must be configured separately E. must be combined with NSF to support uninterrupted Layer 2 operations Answer: Option A, C. Explanation:  No answer description… Read More »

Which two commands ensure that DSW1 becomes the root bridge for VLAN 10 and 20? (Choose two.)

Refer to the exhibit. Which two commands ensure that DSW1 becomes the root bridge for VLAN 10 and 20? (Choose two.) A. spanning-tree mst 1 priority 4096 B. spanning-tree mst 1 root primary C. spanning-tree mst vlan 10,20 priority root D. spanning-tree mst 1 priority 1 E. spanning-tree mstp vlan 10,20 root primary Answer: Option A, B. Explanation: … Read More »

What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?

A. mainframe B. host C. virtual machine D. container Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system? appeared first on Majanto.