Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-401 Exam Dumps - Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)

Go to page:
Question # 57

In a virtual environment, what is a VMDK file?

A.

A file containing information about snapshots of a virtual machine.

B.

A zip file connecting a virtual machine configuration file and a virtual disk.

C.

A configuration file containing settings for a virtual machine such as a guest OS.

D.

A file containing a virtual machine disk drive.

Full Access
Question # 58

What is a benefit of using segmentation with TrustSec?

A.

Integrity checks prevent data from being modified in transit.

B.

Security group tags enable network segmentation.

C.

Firewall rules are streamlined by using business-level profiles.

D.

Packets sent between endpoints on a LAN are encrypted using symmetric key cryptography.

Full Access
Question # 59

What is the purpose of data modeling languages?

A.

to describe a data schema convertible into any data encoding format

B.

to specify algorithms necessary to decode binary-encoded protocol data units

C.

to translate encoded data for interoperability between different CPU architectures

D.

to provide a framework to describe data flow patterns in networks

Full Access
Question # 60

How does NETCONF YANG represent data structures?

A.

as strict data structures defined by RFC 6020

B.

in an XML tree format

C.

In an HTML format

D.

as modules within a tree

Full Access
Question # 61

Refer to the exhibit.

Which JSON syntax is derived from this data?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 62

What are two characteristics of a directional antenna? (Choose two.)

A.

high gain

B.

receive signals equally from all directions

C.

commonly used to cover large areas

D.

provides the most focused and narrow beam width

E.

low gain

Full Access
Question # 63

How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?

A.

Add a timestamp to the request in the API header.

B.

Use a password hash.

C.

Add OAuth to the request in the API header.

D.

Use HTTPS.

Full Access
Question # 64

Which access control feature does MAB provide?

A.

user access based on IP address

B slows devices to bypass authentication

B.

network access based on the physical address of a device

C.

simultaneous user and device authentication

Full Access
Go to page: